View on GitHub

CyberSecurity

A curriculum for a high school cyber security course.

Viruses, Worms, Trojans, and other Malware

Overview

Software installed on computers may have negative application to the user. It may not have been installed by the user intentionally. We will explore various types of malicious software that is installed on computers, how it works, and how to prevent it.

Purpose

Malicious software is often used to capture information from users, erase or steal data, and even use a computer as a part of a larger botnet army. Students should learn what happens when this type of software is installed, how it is installed with or without the user’s knowledge, and what can be done to prevent it.

Objectives

Students will be able to:

Preparation

Vocabulary

Teaching Guide

Getting Started

Activity

Have students form groups and research one of the specific types of malware. With each type students should be able to identify:

The types of malware students should research:

Students should present their information to the class.

Wrap-up

Discussion:

Assessment Questions

Extended Learning

Standards Alignment

Indiana - CS3S-2.2 Indiana - CS3S-3.1

License

Cyber Security Curriculum Creative Commons License is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.