100% found this document useful (5 votes)
6K views

ICT - Teacher's Guide

This document provides guidance for teachers on activities related to computer security for students. It advises that certain activities involving installing computer systems and setting up networks should not use computers from the school lab. It also notes that antivirus software, anti-spyware software, and sample files should be installed or available on students' personal computers before activities. The document gives an overview of cryptography concepts and provides examples of encrypting and decrypting letters. It also provides instructions for disabling the Windows firewall and conducting data backup activities. Human aspects of security risks like unauthorized access, hardware theft, and identity theft are also briefly discussed.

Uploaded by

Sekolah Portal
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (5 votes)
6K views

ICT - Teacher's Guide

This document provides guidance for teachers on activities related to computer security for students. It advises that certain activities involving installing computer systems and setting up networks should not use computers from the school lab. It also notes that antivirus software, anti-spyware software, and sample files should be installed or available on students' personal computers before activities. The document gives an overview of cryptography concepts and provides examples of encrypting and decrypting letters. It also provides instructions for disabling the Windows firewall and conducting data backup activities. Human aspects of security risks like unauthorized access, hardware theft, and identity theft are also briefly discussed.

Uploaded by

Sekolah Portal
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

DRAFT

INFORMATION AND COMMUNICATION


TECHNOLOGY

TEACHER’S NOTE

PUSAT PERKEMBANGAN KURIKULUM


KEMENTERIAN PELAJARAN MALAYSIA
ARAS 4-8, BLOK E9, PUTRAJAYA

2006
DRAFT

This document comes together with the Learning Module


for students. You are advised to read this document
before getting the students to start with the Learning
Module.

In carrying out activities for topic 2.4 Installation Computer


System and 3.4 Setting Network Facilities, DO NOT use
the computers in the computer lab. You are advised to
have a different set of computers for these activities. You
have to ensure that all the computer components, parts
and hardware are available for the students to carry out
the activities found in the module.

2
DRAFT

References:

Books

1. Capron H.L, J.A. Johnson (2005) Computers: Tools For An Information


Age. Complete. Eight Edition.
2. Shelly G.B, Cashman T.J, Vermaat M.E, Walker T.J. (2004) Discovering
Computers 2005 : A Gateway to Information, Course Technology.
3. Stallings W. (2003) Cryptography and Network Security: Principles and
Practices. Third Edition.
4. Irv Englander (2000) The Architecture of Computer Hardware and
Systems Software, An Information Technology Approach: Second Edition.
5. Tamara Dean (2000), “Network + Guide to Networks”, Thomson Course
Technology

Websites addresses

ICT and Society


1. Ad-Aware SE Personal ~ http://www.lavasoft.com
2. Antivirus ~ http://www.primode.com/glossary.html
3. Anti-spyware ~ http://www.antispywarecoalition.org/definitions.pdf
4. AVG Free Edition Antivirus ~ http://www.grisoft.com
5. Cryptography ~ http://privacy.getnetwise.org/browsing
6. Cryptography ~ http://www.faqs.org/faqs/cryptography-faq/
7. Cryptography~ http://www.shodor.org/interactivate/discussions/cipher.html
8. Cryptography ~ http://www.signalguard.com/security/encryption.htm

Computer System
1. http://www.scsite.com
2. http://webopedia.com/
3. http://www.microsoft.com/assemble
4. http://www.microsoft.com/biossetup
5. http://www.grisoft.com
6. http://www.pcguide.com
Computer Networks and Communications
1. http://www.lanshack.com
2. http://www.homenethelp.com
3. http://www.crossover.asp
4. http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/filesharin
g.mspx

3
DRAFT

INFORMATION AND
COMMUNICATION TECHNOLOGY
AND SOCIETY

1.3 COMPUTER SECURITY

4
DRAFT

Topic: 1.3 COMPUTER SECURITY


1.3.3 Security measures

At the end of the lesson, students should be able to:

1.3.3.3 Apply the correct security procedures.

A. Antivirus
B. Anti-Spyware
C. Cryptography
D. Firewall
E. Data backup
F. Human aspects

Individual / group activities

Before using this module teacher has to ensure the following:

A. Antivirus

i. An Antivirus Software must be preinstalled in students’ personal


computer.
Example: AVG Free Edition software
ii. Test file for virus check must be copied on the desktop of students’
personal computer.
Example: eicar.com
iii. AVG Free Edition and Eicar.com is included in Teaching guide CD.

B. Anti-spyware
i. Anti-spyware software must be preinstalled in students’ personal
computer.
ii. Ad -Aware SE Personal software is included in Teaching guide CD.

Note on spyware:
Spyware and adware

Some vendors or employers use spyware to collect information about


program usage or employees. Internet advertising firms often collect
information about users’ Web browsing habits by hiding spyware in
adware. Adware is a program that dispkays an online advertisement in a

5
DRAFT

banner or pop-up windows on Web pages, email, or othe Internet


services.

How to protect your computer from spyware?

The best defence against spyware and other unwanted technologies is to


prevent them from getting into your computer in the first place. Here are
some steps you can take to stay safe while using the Internet and
software programs.

- Keep security on your computer up to date


o Update security patches
o Security and privacy settings in Internet browsers
- Only download programs from web sites you trust.
- Beware of the fine print: Read all security warnings, license
agreements, privacy statements, and “opt-in” notices with any
software you download.
- Don’t be tricked into clicking: You don’t have to click “OK,” “Agree,”
or “Cancel” to close a window.
- Be extra careful with certain types of “free” programs.
- Use available tools to detect and delete spyware.
o Anti-spyware and antivirus software
o Personal firewall

C. Cryptography

i. The activity on cryptograph will be on paper not computer.


ii. This is a group activity.

NOTE on cryptography
A process associated with scrambling plaintext (ordinary text, or cleartext)
into ciphertext (a process called encryption), then back again (known as
decryption).

Cryptography concerns itself with four objectives:


1) Confidentiality (the information cannot be understood by anyone for
whom it was unintended)
2) Integrity (the information cannot be altered in storage or transit
between sender and intended receiver without the alteration being
detected)
3) Non-repudiation (the creator/sender of the information cannot deny at
a later stage his or her intentions in the creation or transmission of the
information)
4) Authentication (the sender and receiver can confirm each other
www.stallion.com/html/support/glossary.html

6
DRAFT

How to calculate

Encryption algorithm: C = (P + K) mod 26 with K = 3

To encrypt a letter H :
1. Substitute the letter H into number.
H=7
2. Use the algorithm. P = 7, K = 3
C = (P + K) mod 26
= (7 + 3) mod 26
= 10 mod 26

mod = balance of
division

= 10
3. Convert the number 10 into letter.
10 = K

Decryption algorithm: P = (C – K) mod 26 with K = 3

To decrypt the letter K:


1. Substitute the letter K into number.
K = 10
2. Use the algorithm. C = 10, K = 3
P = (C – K) mod 26
= (10 – 3) mod 26
= 7 mod 26

=7

3. Convert the number 10 into letter.


7=H

7
DRAFT

D. Firewall

i. Ensure the windows firewall is disabled in students’ computer


before they start the module.
ii. In Microsoft Windows XP Service Pack 2 (SP2), Windows Firewall
is turned on by default. (However, some computer manufacturers
and network administrators might turn it off.)
iii. You do not have to use Windows Firewall —you can install and run
any firewall that you choose. Evaluate the features of other firewalls
and then decide which firewall best meets your needs. If you
choose to install and run another firewall, turn off Windows Firewall.
iv. As enrichment, you can ask the students to disable the firewall and
surf the Internet. Then, try surfing the Internet again but this time
with the firewall enabled. Ask students to observe any differences?
Normally the firewall will block the download and upload files
activities if you are using instant messaging like Yahoo messenger.

E. Data backup
i. Provide students with a blank diskette or a floppy disk.
ii. Make sure My document folder is on the desktop.
iii. Save a file or document in My Documents folder.

F. Human Aspect

Note on security risk generally done by human.


Computers are exposed to several types of security risks .

Security Risks Descriptions


Unauthorized • Unauthorized access - the use of a computer or
access and use network without permission.
• Unauthorized use – the use of a computer or its data
for unapproved or possibly illegal activities.
Hardware Theft • Hardware theft – the act of stealing computer
and Vandalism equipment.
• Hardware vandalism – the act of destroying computer
equipment.
Identity Theft When someone steals personal or confidential
information.
Software Theft When someone
• steals software media
• intentionally erases programs
• illegally copies a program

8
DRAFT

How to protect your computer from perpetrators?

User may take several measures to help protect computer from perpetrators.

Security Risks Safeguards


Unauthorized • Company should have a written acceptable use policy
access and use (AUP) that outlines the computer activities for which
computer and network may and may not be used.
• Users should be identified and authenticated.
• Users should disable file and printer sharing on your
Internet connection.
Hardware Theft • Users should have common sense and a constant
and Vandalism awareness of the risk.
• Organisations should implement physical access
control (locked doors, windows and equipment).
• Computers use passwords, possessed objects and
biometrics.
Software Theft • Organisations should keep original software boxes and
media in a secured location.
• Manufacturers should issue users license agreement
to protect from software piracy
Identity Theft • Organisations should implement user identification and
authentication controls.
• Oganisations use a variety of encryption techniques to
keep data secured and private.

9
DRAFT

COMPUTER SYSTEM

2.4 Installation

10
DRAFT

Topic: 2.4 Installation


2.4.1 Personal Computer (PC) Assembling
2.4.2 Hard Disk Partitioning and Formatting
2.4.3 Software Installation

At the end of the lesson, students should be able to:

2.4.3.1 Assemble the parts of a PC correctly


2.4.3.2 Participate in assembling the parts of a PC correctly
2.4.3.3 Display cooperation in assembling the parts of a PC
correctly
2.4.3.4 Format and partition the hard disk
2.4.3.5 Install operating system, applications software and utility
programs

ACTIVITIES (Group activity)

1. Ensure all components are available by using the checklist below. Students’
copy is in the module.
2. Do not use the computers in the computer lab. Buy a different set or use
other computers in the school.
3. Teacher has to demonstrate first.
4. It is advisable to wear an anti-static wrist strap that is properly grounded.
5. Encourage students to handle all the components with great care.

11
DRAFT

Checklist

No. Components Tick (√) if


available
1 CPU casing and power
supply
2 CPU chip
3 Motherboard
4 Hard disk
5 Floppy disk drive
6 CD Rom drive
7 Cables
o IDE cable
o floppy cable
o audio cable
8 Cards
o modem card
o display card
o sound card
o network card
(not needed if all devices
are integrated on-board)
9 RAM chips
10 Mouse
11 Speakers
12 Keyboard

12
DRAFT

COMPUTER NETWORKS AND


COMMUNICATIONS

3.4 SETTING NETWORK FACILITIES


MODULE

13
DRAFT

TOPIC: 3.4 SETTING NETWORK FACILITIES


3.4.1 Installation of Network Interface Cards (NIC)
3.4.2 Cable Crimping and Testing
3.4.3 Configuration and Testing of Network
3.4.4 Share Data

At the end of the lesson, students should be able to:


3.4.1.1 Insert network interface cards (NIC)
3.4.1.2 Install drivers for the NIC
3.4.2.1 Crimp and test UTP cable
• Straight cable
• Crossed cable
3.4.2.2 Exercise care and caution when crimping a cable
3.4.3.1 Configure the workstation to join a Local Area Network
• Internet Protocol (IP) Address
• Subnet Mask
• Server name
3.4.3.2 Test the network connection
3.4.4.1 Create a shared folder

Activities (Group work)


1. Ensure all components are available by using the checklist below.
Students’ copy is in the module.
2. Do not use computers in the computer lab. Buy a different set or
use other computers found in the school.
3. You need to have 3 sets of computers for this activity.
4. Teacher has to demonstrate first.
Checklist

No. Hardware Tick (√) if


available
Network Interface Card (NIC)
NIC driver
Switch / Hub
CAT5E cable (UTP cable)
RJ45 connectors
LAN cable tester
Crimp tool
Cable stripper
Cutter
Screwdrivers

14

You might also like