0% found this document useful (0 votes)
148 views

Activity 1-2 Module 2

Uploaded by

Rodolfo Ragel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views

Activity 1-2 Module 2

Uploaded by

Rodolfo Ragel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

CALMAY INTEGRATED SCHOOL

NAME: _______________________________________ SCORE: _____________


GRADE LEVEL: ____________ DATE: _____________

What’s More

Activity 1: Case Study


Read and understand the text. And answer the question on the next page.

CASE STUDY: WHAT THE? —Online scams and identity Theft

Transcript

“Well, I downloaded a lot of stuff to my computer—heaps of stuff actually:


music, programs, games. I guess in the back of my mind I’ve always been worried about security
but I didn’t think I could do anything about it, or anything that bad could happen to me. I guess
when you’re connected and doing frequent downloads you never know what’s coming down your
phone line.

One day I downloaded this particular program, and after that my computer seemed to be a
lot slower. It was taking forever for pages to load and even normal things like writing an email or
writing a Word document would take a long time. I didn’t think too much of it ‘cos my computer
was getting pretty old and I had heaps of stuff on it. But then my home page got changed to some
free download site and when I checked my internet settings I found that they’d all been changed.
But things kept on getting worse. Whenever I went online to the internet I got bombarded with
pop-ups and, like, my computer would just crash and I would have to manually reset it.

Then things got really serious. I couldn’t log-in to my email account and I discovered that
someone was using my internet banking. I had anti-virus software installed onto my computer but
it just wasn’t picking up anything.

What I didn’t realize at the time was that when I’d downloaded this free program a couple of
months ago, a smaller program downloaded and installed itself onto my computer. But, I had no
idea.

This spyware program monitored all my internet activity and the keylogger recorded all the
keystrokes I made on the computer such as my log-in, my passwords and all the emails I sent to
my mates. It then sent all this information to the software developer. I ended up taking my
machine to a computer specialist who was able to find and remove all the spyware. I had to
contact my bank and my ISP to change my account details.
You know, even free stuff comes at a cost nowadays and I know it sounds corny, but if it’s too
good to be true then it probably is. Before I download anything now I make sure there’s no adware
or spyware associated with it and I read the user agreement statement. There are websites online
that, sort of, help you out with this and can offer great reviews and advice on the program and
company that you’re downloading from. If it’s free, there’s usually a catch. I guess I learnt the
hard way.” - Brian

According to the text, give possible answers to the following questions:


Brian complains that his virus protection doesn’t work. What do you think has gone wrong?
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

Prepared by:
RODOLFO G. RAGEL JR.
CALMAY INTEGRATED SCHOOL
NAME: _______________________________________ SCORE: _____________
GRADE LEVEL: ____________ DATE: _____________

Activity 2
Choose at least three of the mentioned online safety tips and explain.
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

What I Have Learned

Answer the following questions.

1. How does a virus infect a computer?


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

2. How do computer worms spread?


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

3. How do fraudsters use social media to steal information?


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

4. What do fraudsters who practice phishing usually steal?


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

5. When does copyright infringement occur?


___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

What I Can Do

Share an experience that you have always tend to do but later did you discover that it is not a
standard of ONLINE SAFETY, SECURITY, ETHICS, AND ETIQUETTE.
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
Prepared by:
RODOLFO G. RAGEL JR.

CALMAY INTEGRATED SCHOOL


NAME: _______________________________________ SCORE: _____________
GRADE LEVEL: ____________ DATE: _____________

Assessment
Identification: Identify the Internet threat described in each number.

__________________1. Jonathan is having a problem because his files were


corrupted. He discovered that most of his folders were
replicated.

__________________2. Ken was asked to pay a certain amount of money for


him to retrieve his files. Ken might be a victim of ______.

__________________3. Mari found a good application and she installed it on


her computer. But after the installation some of her
files were deleted.

__________________4. Jack is receiving several irrelevant messages every day


and his e-mail account has become almost unusable.

__________________5. The network servers of KNCHS stopped to respond and


it was found out that much of the systems' memory was
consumed by the malicious software. What kind of
malware is this?

__________________6. Jewel is using a technique that tries to take information


from the user. She commonly takes things like credit
cards, usernames, passwords, and home addresses
using a fake website. What type of threat is depicted in
the scenario?
__________________7. This program can record all you enter on your keyboard.

__________________8. Eli received an unwanted email that contains


advertisements. What type of internet threat is depicted
in the scenario?

__________________9. A kind of internet threat where the attacker uses a fake


website to get your sensitive information.

__________________10. A program that runs in the background without you


knowing it. It has the ability to monitor what you are
currently doing.

Additional Activities
Solve the crossword below. Write your answers on the separate sheet of paper.
Prepared by:
RODOLFO G. RAGEL JR.

You might also like