0% found this document useful (0 votes)
34 views4 pages

Group 4 - SDLP

Uploaded by

Reuven Mandigma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views4 pages

Group 4 - SDLP

Uploaded by

Reuven Mandigma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

VALENZUELA CITY TECHNOLOGICAL COLLEGE

Kamagong St. Fortune Village 6, Parada, Valenzuela City


Tel No.: 293-0775/292-0480

Semi-Detailed Lesson Plan


Digital/Cyber Literacy

I. Objective

At the end of the lesson, the student should be able to:


a. Identify what is Digital/Cyber Literacy
b. Value the importance of Digital/Cyber Literacy
c. Demonstrate the possible effects of un-proper use of Digital
Literacy

II. Subject Matter

Area: Information and Communications Technology


Topic: Digital/Cyber Literacy
Materials: Laptop, Projector, Power point presentation
Reference: Textbook, Online Websites

III. Procedure:

A. Preparatory Activities
a. Daily Routinary Activities (Greetings, Opening Prayer, Classroom
Management, Attendance)
b. Review of the past lesson (
c. Motivation
d. Unlocking of difficulties

B. Main Activities
a. Lecture/Discussion
1. Digital/Cyber Literacy 5. Computer Threats and Fixing Solutions
2. Cybersecurity 6. Cyber Crime
3. Cyber Citizenship 7. Cyber Bullying
4. Proper Netiquette

1. Digital Literacy
According to Wikipedia, digital literacy is the set of competencies required for
full participation in society that includes the knowledge, skills, and behaviors
involving the effective use of digital devices for purposes of communication,
expression, collaboration and advocacy.
Simply, it is the ability of an individual to engage with the digital
environment and operate technologies safely by knowing what to do and what not to
do and how to avoid unnecessary risks.
Digital literacy is an individual’s ability to access both information and
methods of communication through technological tools, such as smartphones, tablets,
laptops, and desktop PC’s. While digital literacy is initially focused on digital skills
and stand-alone computers, its focuses has shifted to network devices, including the
Internet and the use of social media.
VALENZUELA CITY TECHNOLOGICAL COLLEGE
Kamagong St. Fortune Village 6, Parada, Valenzuela City
Tel No.: 293-0775/292-0480

2. Cybersecurity
The practice of protecting systems, networks, and programs from digital
attacks. These cyberattacks are usually aimed at accessing, changing, or destroying
sensitive information; extorting money from users; or interrupting normal business
processes. Implementing effective cybersecurity measures is challenging because
there are more devices than people, and attackers are becoming more innovative. Here
are some tips on how to protect yourself against cyber threats.

3. Cyber Citizenship
An old value that is now applied to a new medium, the Internet. Cyber
Citizenship refers to being responsible when using the internet. Doing online when no
one is looking speaks a lot about one’s character and morals. The power of this digital
worlds is associated with responsibilities and consequences. Therefore, we can
explore and navigate all information

4. Proper Netiquette
Follow these simple rules to ensure that you make wise choices when sending
messages online.
1. Make sure you have the correct address (with proper spelling), correct link and you
are sending the information to the right person when doing it online.
2. Check information before sending or posting any message and avoid false
statements and information to the web or forwarding junk mail or chain letters to
family and friends.
3. Re-read the what you wrote to make sure it is what you want to say and the other
person would interpret in the same way.
4. Keep your comments clean and don’t confront others online or say anything that
could be hurtful to them.
5. Keep your personal and friend’s information private and don’t send information
that was just given to you without his/her permission.
6. Watch out for spam and other fraud e-mails and never reply to them.
7. If you are going to write something personal or private, think twice because
messages can get mis-delivered.
8. Adults should monitor kid’s messages, especially when they are sending e-mails to
others without permission.

5. Computer threats and fixing solutions

A threat, in the context of computer security, refers to anything that has the
potential to cause serious harm to the computer system. It is something that may or
may not happen, but has the potential to cause serious damage and can lead to attacks
on computer systems and networks.
Cybercrime is now becoming alarming in the life of every individual and the
organization as they intend to steal information that they can sell or trade, such as
financial details, credit card information, personal details, or any other information
using computer networks.
Given the numerous way a computer virus can spread, the following are ways
to ensure that the computer networks can be protected.
VALENZUELA CITY TECHNOLOGICAL COLLEGE
Kamagong St. Fortune Village 6, Parada, Valenzuela City
Tel No.: 293-0775/292-0480

1. Install anti-virus software. Ensure that reputable anti-virus software is


installed on all computers, including all servers, PC’s and laptops.
2. Ensure that the anti-virus software is up-to-date. New computer viruses are
being released daily and so it is essential that computers are protected by keeping anti-
virus software is up-to-date.
3. Employ a firewall to protect networks. As computer viruses can spread by
means of other than email, it is important that unwanted traffic is blocked from
entering the network by using a firewall.
4. Filter all e-mail traffic. Example of e-mails with certain file attachments
commonly used by computer viruses to spread themselves, such as EXE, .COM, and
SCR files.
5. Educate all users to be careful of suspicious e-mails. Ensure that all users
know to never open an attachment or to click on a link in an email they are not
expecting.
6. Scan Internet Downloads. Ensure that all files downloaded from the Internet
are scanned against computer viruses from one central point on the network.
7. Do not run programs of unknown origin. It is important to use a trusted
source for software requirements to be installed and ensure it can be accounted for.
8. Implement a vulnerability management system. It is important to regularly
review network and the applications on it for new vulnerabilities and a plan on how to
manage them, either by patching or upgrading them using tools, such as firewalls or
Intrusion Detection Systems that should be put in place.
9. Make regular backups of critical data. There is a need to keep important
files on removable media, such as portable drives or tape for back-up in the event that
the network is infected with a computer virus.
10. Develop an Information Security Policy. The creation and publication of
an Information Security Policy is key to ensuring that information security receives
the profile it requires in order to secure systems and data.
11. Monitor logs and systems. Regular monitoring of network and system logs
can assist in the early identification of a computer virus infecting the networks or
attacks by criminals.
12. Develop an Incident Response Plan. The incident response plan outlines
the roles and responsibilities of people in the event of a computer virus infecting the
network or any other type of security breach.
13. Restrict end-user access to the systems. Where possible, end users are
prohibited from access to the system so that the virus will also be restricted.

6. Cybercrime
Avast defines cybercrime as any criminal activity carried out using computers
or the Internet. Cybercrime uses tools like phishing, viruses, spyware, ransomware,
and social engineering to break the law.
There is a wide variety of cybercrimes, which can broadly be placed into two
categories: one-off crimes, such as installing virus that steals your personal data; and
ongoing crimes, such as cyberbullying, extortion, distributing child pornography or
organizing terrorist attacks.
Cybercrime may also be referred to as crime practiced by those who have
technological skills and use the internet to achieve their bad motive. Cybercriminals
employ their diverse skill to access bank accounts, steal identity blackmailing,
VALENZUELA CITY TECHNOLOGICAL COLLEGE
Kamagong St. Fortune Village 6, Parada, Valenzuela City
Tel No.: 293-0775/292-0480

defraud, stalk and harass or use a compromised computer to attack their victims.
Criminals can also use computers for communication and document or data storage
and those, who perform these illegal activities, are often referred to as hackers

You might also like