Академический Документы
Профессиональный Документы
Культура Документы
Inc.
Integrated Basic Education Department
Macasandig, Cagayan de Oro City
Greeting: Good morning / afternoon everyone! Praised be Jesus and Mary! Welcome to our
module for this session. You will find here our general instructional guidelines, then
the components of our module. You will be guided one step at a time through the
specific instructions of the learning tasks given below, which intend to develop our
cognitive skills as well as our values, considering current social realities. Let joy and
peace abound in your mind and heart as you genuinely and responsibly respond to
the learning processes that this module offers.
You are reminded that at the end of the module, you are expected to comply all the required
tasks/activities, and answer post-test showing all your solutions for the activities.
Note: Kindly upload your output in our Google Classroom using your account. File name must
be: FamilyName_Activtity_A.
Example: Salugsugan_Activity_A. Deadline will be on August 10, 2020, 6PM sharp. If you have
considerable concerns or problems, feel free to communicate about it.
Module Overview: This module allows you to be aware on how to be safe and secured
through ICT. In the past, safety and security is all about protecting our computers from
different types of various attacks. Today, online safety and security has been a big issue
because of the Internet’s vast reach, constantly and fast changing technology.
Nowadays, knowing online safety as well as security is indeed a must to protect one
from numerous online hazards.
OBJECTIVES:
In these lessons, you will learn the following:
1. consider one’s and other’s safety when sharing information using the Internet;
2. consider one’s and other’s reputation when using the Internet;
3. determine and avoid the dangers of the Internet; and
CONTENT FOCUS:
INTERNET THREATS
1. Malware – stands for malicious software, it is intended to damage or disable
computer systems which has codes to collect information without one’s knowledge.
Kinds of Malware:
a. Virus – a malicious program designed to replicate itself and transfer from one
computer to another (internet, local networks, FDs, CDs, etc.)
b. Worm – a malicious program that transfers from one computer to another by
any types of means. Ex. ILOVEYOU Worm
c. Trojan – a malicious program that disguises as a useful program but once
downloaded or installed, leaves your PC unprotected and allows hackers to get
your information.
d. Spyware – a program that runs in the background without you knowing it (thus
called “spy”). It has the ability to monitor what you are currently doing and typing
through keylogging.
e. Adware – a program designed to send you advertisements, mostly as pop-
ups.
f. Ransomware – or ransom software is a type of malicious software from
cryptovirology that threatens to publish the victim's data or perpetually block
access to it unless a ransom is paid.
2. Spam – an unwanted email mostly from bots or advertisers. It can be used to send
malware.
3. Phishing – an unwanted acquisition of sensitive personal information like passwords
and credit card details.
To help you better more understand about Internet threats, please read this file from the
given link below.
https://www.kaspersky.com/resource-center/threats/computer-viruses-and-malware-
facts-and-faqs
Note: Send your final outputs in our Google Classroom following the given file name
format.
1. How can you apply safety, security, ethics and etiquette standards and practice in the
use of ICT?
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
INTEGRATION:
Ignacian Core/Related Value
Core Values: Excellence
Related Values: Discipline
Question: The Internet is a vast world filled with numerous data. What would the user
lose when s/he has a bad record online and this would always pop up in search results?
Note: Send your final outputs in our Google Classroom following the given file name
format.
Summing up what I learned in my journey through this lesson:
I learned that
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
I realized that
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
I promise to
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
FEEDBACK
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
REFERENCES:
“McAfee teen Safety Test: How Safe Is Your Surfing? “McAfee, n.d. Web. 22 May 2020.
Norman AS. “Top 10 Internet Threats.” Norman.com, n.d. Web. 22 May 2020.
ANON. Empowerment Technologies Innovative Training Works, First Edition, REX, 2016.
ANON. Empowering ICT Empowerment Technologies-Senior High, CAD, 2017.