Академический Документы
Профессиональный Документы
Культура Документы
I. OBJECTIVES
A. Content Standard The learner demonstrates understanding of the underlying concepts and principles on
configuring computer systems and networks.
B. Performance Standard The learner independently demonstrates skills in configuring computer systems and
networks as prescribed by TESDA Training Regulations.
C. Learning Competencies LO 2. Configure computer systems and networks
Learning Outcome Enable network security to the computer systems
Learning Objectives - Identify different types of threats in network security
- Discuss how threats or security attacks affects the computers in a network
- Identify and recognize security attacks in the computer
- Suggest 3 ways to avoid computer security attacks
- Discuss in 10 minutes the security attack assigned to their group in a 10-
slide PowerPoint presentation.
LC code TLE_ICTCS10CC-Id-e-1
CONFIGURING COMPUTER SYSTEMS AND NETWORKS (CC)
II. CONTENT
Threats to Computer Security
III. LEARNING RESOURCES
A. References
1. Teacher’s Guide pages TG pages 29 & 32
2. Learner’s Material pages LM Pages 141 – 1 56
3. Textbook pages
4. Additional Material from
Learning Resource (LR) Portal
B. Other Learning Resources
IV. PROCEDURES
A. Reviewing previous lesson or Review terms in network security
presenting the new lesson.
B. Establishing a purpose for the lesson State the learning competencies/objectives
C. Presenting Examples/ instances of the Present news/video clips of major security attacks in the Philippines
new lesson
Group | Topic
1. Pharming
2. Phishing
3. Vishing
4. Tailgating & impersonation
5. Ransomware
6. Adware & spyware
7. Spam
8. Denial of Service
9. Key loggers
10. Botnets
11. Waterhole attacks
12. Social Engineering
13. Cryptographic attacks
14. Wireless jamming
15. Hoaxes