Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

A SEMI DETAILED LESSON PLAN IN EMPOWERMENT TECHNOLOGY – GRADE 11

I. Objectives
At the end of the lesson, the learners can/will;
a. Define what is a malware.
b. Describe what are the different types of malwares.
c. Differentiate the different types of malwares.
d. Know what to do in order to prevent, detect, and remove malwares.

II. Subject Matter


Topic: Cybersecurity - Malware
Instructional Material: PowerPoint Presentation
Reference: CS_ICT11/12-ICTPT-Ia-b-2 - Empowerment Technologies Curriculum for
Applied Track Subject (DepEd MELC)

III. Procedure
A. Preliminary Activities
a. Prayers
- Let learners lead the prayer.
b. Greetings
- Introduce yourself to the class and greet them.
c. Classroom Settings
• Let learners arrange their chairs.
• Let learners pick up trash.
d. Attendance
• Ask learners who is absent.
B. Lesson Proper
1. Activity
• Let learners define how a disease affects the human body.
• Relate this to what is happening to computers.
2. Analysis
• What do you think are the “disease” of computers?
• What does these “diseases” do to a computer?
3. Abstraction

What is Malware?

• Malware, short for malicious software, is any kind of software that's


designed to harm a computer. Malware can steal sensitive information from
your computer, gradually slow down your computer, or even send fake
emails from your email account without your knowledge.

Common types of Malwares

a. Viruses - A harmful computer program that can copy itself and infect a
computer.
b. Worms - A malicious computer program that sends copies of itself to
other computers via a network.
c. Trojan Horse - A destructive program that pretends to be a useful
application, but harms your computer or steals your information after
it's installed.
d. Spyware - Malware that collects information from people without their
knowledge.
e. Adware - Software that automatically plays, displays, or downloads
advertisements on a computer.

How does a Malware spread?

• Downloading free software from the Internet that secretly contains malware
• Downloading legitimate software that's secretly bundled with malware
• Visiting a website that's infected with malware
• Clicking a fake error message or pop-up window that starts a malware
download
• Opening an email attachment that contains malware

How can we detect a Malware?

- Users may be able to detect malware if they observe unusual activity such
as a sudden loss of disk space, unusually slow speeds, repeated crashes
or freezes, or an increase in unwanted internet activity and pop-up
advertisements.
How can we remove a Malware?

- Security software products are designed to detect and prevent malware, as


well as remove it from infected systems.

How can we prevent a Malware?

• Keep your computer and software updated


• Use a non-administrator account whenever possible
• Think twice before clicking links or downloading anything
• Be careful about opening email attachments or images
• Don't trust pop-up windows that ask you to download software
• Limit your file-sharing
• Use antivirus software
4. Application
In a ¼ sheet of paper, answer this:
• Which type of malware will you be able to resolve by yourself and what are
the steps you will do to resolve it?

IV. Evaluation

Enumerate the following. Each item will be 2 (two) points.

1. A destructive program that pretends to be a useful application. Named after a great attack
by the Greeks. Trojan Horse
2. A kind of software that is designed to harm a computer. Malware
3. A malicious computer program that sends copies of itself to other computers via a
network. Worms
4. A harmful computer program that can copy itself and infect a computer. Virus
5. Malicious software that collects information from people without their knowledge. Spyware

V. Assignment
Create your very own Malware using the following guidelines:
• Your Malware has to have a unique name.
• Describe what type of Malware is it and what it does to a device.
• Explain how it can affect a device. (You can give a scenario or a run through
of the attack)
Do this on a short bond paper. Can be printed or hand-written. Submission is on our
next meeting.

Prepared by: Celis, Paula Danielle I.

You might also like