Professional Documents
Culture Documents
EmpTech-Malware(4A's_LessonPlan)
EmpTech-Malware(4A's_LessonPlan)
I. Objectives
At the end of the lesson, the learners can/will;
a. Define what is a malware.
b. Describe what are the different types of malwares.
c. Differentiate the different types of malwares.
d. Know what to do in order to prevent, detect, and remove malwares.
III. Procedure
A. Preliminary Activities
a. Prayers
- Let learners lead the prayer.
b. Greetings
- Introduce yourself to the class and greet them.
c. Classroom Settings
• Let learners arrange their chairs.
• Let learners pick up trash.
d. Attendance
• Ask learners who is absent.
B. Lesson Proper
1. Activity
• Let learners define how a disease affects the human body.
• Relate this to what is happening to computers.
2. Analysis
• What do you think are the “disease” of computers?
• What does these “diseases” do to a computer?
3. Abstraction
What is Malware?
a. Viruses - A harmful computer program that can copy itself and infect a
computer.
b. Worms - A malicious computer program that sends copies of itself to
other computers via a network.
c. Trojan Horse - A destructive program that pretends to be a useful
application, but harms your computer or steals your information after
it's installed.
d. Spyware - Malware that collects information from people without their
knowledge.
e. Adware - Software that automatically plays, displays, or downloads
advertisements on a computer.
• Downloading free software from the Internet that secretly contains malware
• Downloading legitimate software that's secretly bundled with malware
• Visiting a website that's infected with malware
• Clicking a fake error message or pop-up window that starts a malware
download
• Opening an email attachment that contains malware
- Users may be able to detect malware if they observe unusual activity such
as a sudden loss of disk space, unusually slow speeds, repeated crashes
or freezes, or an increase in unwanted internet activity and pop-up
advertisements.
How can we remove a Malware?
IV. Evaluation
1. A destructive program that pretends to be a useful application. Named after a great attack
by the Greeks. Trojan Horse
2. A kind of software that is designed to harm a computer. Malware
3. A malicious computer program that sends copies of itself to other computers via a
network. Worms
4. A harmful computer program that can copy itself and infect a computer. Virus
5. Malicious software that collects information from people without their knowledge. Spyware
V. Assignment
Create your very own Malware using the following guidelines:
• Your Malware has to have a unique name.
• Describe what type of Malware is it and what it does to a device.
• Explain how it can affect a device. (You can give a scenario or a run through
of the attack)
Do this on a short bond paper. Can be printed or hand-written. Submission is on our
next meeting.