THREATS TO SECURITY
UNIFIED SCHEMES OF WORK FOR PRIMARY SCHOOL
NATIONAL VALUES EDUCATION
PRIMARY SIX SECOND TERM
SECURITY EDUCATION
Subject:
SECURITY EDUCATION
Term:
Second Term
Week:
Week 9
Class:
Primary 6 / BASIC 6
Previous lesson:
The pupils have previous knowledge of
SECURITY AND SAFETY MANAGEMENT
Topic:
THREATS TO SECURITY
Specific Behavioural objectives:
At the end of the lesson, the pupils should be able to
- Define threats
- Mention common security threats in Nigeria 🇳🇬
- Bonnets
- Hacking
- Phishing
- Malwares
- Adware
- Ransomware
- Explain some security threats
Instructional Materials:
- Wall charts
- Pictures
- Related Online Video
- Flash Cards
Methods of Teaching:
- Class Discussion
- Group Discussion
- Asking Questions
- Explanation
- Role Modelling
- Role Delegation
Reference Materials:
- Scheme of Work
- Online Information
- Textbooks
- Workbooks
- 9 Year Basic Education Curriculum
- Workbooks
Content Development:
What are computer security threats?
Computer security threats are any type of harmful software or activity that can compromise the security of a computer or computer network. These threats can come in many different forms, including viruses, malware, ransomware, phishing attacks, and more. Some common examples of computer security threats include:
Viruses: These are programs that replicate themselves and can spread from one computer to another. They can cause damage to your computer, steal your personal information, or even delete your files.
Malware: This is short for “malicious software,” and it refers to any program that is designed to harm your computer or steal your personal information. Malware can take many different forms, including viruses, worms, trojans, and more.
Ransomware: This is a type of malware that encrypts your files and demands that you pay a ransom in order to decrypt them. Ransomware attacks can be particularly damaging, as they can effectively hold your data hostage until you pay up.
Phishing attacks: These are attempts to trick you into giving away your personal information, such as your login credentials or financial information, by pretending to be a legitimate website or company. Phishing attacks often involve sending fake emails or text messages that look legitimate, but are actually designed to steal your information.
Bonnets: A bonnet is a type of malware that turns a device into a “zombie” that can be controlled by a remote attacker. Bonnets are often used to create botnets, which are networks of compromised devices that can be used to launch distributed denial of service (DDoS) attacks or send spam emails. Bonnets can infect a wide range of devices, including computers, smartphones, and even internet of things (IoT) devices such as smart thermostats or security cameras.
Hacking: Hacking refers to the practice of attempting to gain unauthorized access to a computer or computer network. Hackers may do this for a variety of reasons, such as to steal sensitive information, to plant malware, or to disrupt services. There are many different types of hacking techniques, including brute force attacks, SQL injection attacks, and social engineering.
Other computer security threats:
Adware: This is software that displays advertisements on your computer, often in the form of pop-up windows or banners. While adware itself is generally not malicious, it can be used to track your online activity and deliver targeted ads, and it can also slow down your computer and make it difficult to use.
Spyware: This is software that is designed to track your online activity and collect sensitive information, such as your login credentials, financial information, and browsing history. Spyware can be installed without your knowledge and is often bundled with other software that you download from the internet.
Rootkits: These are programs that allow an attacker to gain hidden access to a computer system and control it without the user’s knowledge. Rootkits can be difficult to detect and remove, as they often run at a low level in the operating system and can bypass security measures.
Trojan horses: These are programs that appear to be legitimate, but are actually designed to carry out malicious activities on your computer. Trojans can be disguised as games, utility programs, or other types of software, and they can be used to steal your personal information, install malware, or take control of your computer
Presentation
The topic is presented step by step
Lesson Introduction:
Begin by explaining that computer security threats are any type of harmful software or activity that can compromise the security of a computer or computer network.
Ask students if they have ever heard of a computer virus or malware, and what they know about these types of threats.
Explain that computer security threats can take many different forms, and it is important to be aware of them in order to protect your computer and personal information.
Lesson Body:
Introduce the different types of computer security threats, including viruses, malware, ransomware, phishing attacks, adware, spyware, rootkits, and Trojan horses.
Provide examples of each type of threat and explain how they can harm a computer or steal personal information.
Discuss the different ways that these threats can spread, such as through email attachments, downloaded software, or visiting infected websites.
Discuss the different types of protective measures that can be taken to prevent these threats, such as using antivirus software, avoiding suspicious emails and websites, and keeping software and operating systems up to date.
Lesson Conclusion:
Review the different types of computer security threats that were discussed.
Emphasize the importance of protecting against these threats in order to keep personal information safe and prevent damage to computers.
Encourage students to be vigilant and cautious when using their computers and to take steps to protect themselves from these types of threats.
Assessment:
Create a quiz to assess student understanding of the different types of computer security threats and how to protect against them.
Have students complete a group project in which they research and present on a specific computer security threat and how to prevent it.
Evaluation
1. What is a type of malware that encrypts your files and demands a ransom to decrypt them?
a) Virus
b) Malware
c) Ransomware
d) Adware
2. What is a program that is designed to track your online activity and collect sensitive information?
a) Spyware
b) Rootkit
c) Trojan horse
d) Phishing attack
3. What is a network of compromised devices that can be used to launch DDoS attacks or send spam emails?
a) Bonnet
b) Botnet
c) Ransomware
d) Malware
4. What is an attempt to trick you into giving away your personal information by pretending to be a legitimate website or company?
a) Phishing attack
b) Malware
c) Ransomware
d) Adware
5. What is a program that displays advertisements on your computer?
a) Adware
b) Spyware
c) Rootkit
d) Trojan horse
6. What is a program that allows an attacker to gain hidden access to a computer system and control it without the user’s knowledge?
a) Rootkit
b) Trojan horse
c) Ransomware
d) Phishing attack
7. What is a program that appears to be legitimate but is actually designed to carry out malicious activities on your computer?
a) Trojan horse
b) Rootkit
c) Ransomware
d) Malware
8. What is a practice of attempting to gain unauthorized access to a computer or computer network?
a) Hacking
b) Phishing
c) Spamming
d) Adware
9. What is a program that replicates itself and can spread from one computer to another?
a) Virus
b) Malware
c) Ransomware
d) Adware
10. What is software that is designed to harm your computer or steal your personal information?
a) Malware
b) Spyware
c) Rootkit
d) Trojan horse
Marking Guide
1. c) Ransomware
2. a) Spyware
3. b) Botnet
4. a) Phishing attack
5. a) Adware
6. a) Rootkit
7. a) Trojan horse
8. a) Hacking
9. a) Virus
10. a) Malware