Computer Science
Grade 9
20 min
Protecting Your Devices: Keeping Your Computer and Phone Secure
Learn how to protect devices from malware and viruses.
Tutorial Preview
1
Introduction & Learning Objectives
Learning Objectives
Identify at least three common digital threats, such as malware and phishing.
Articulate the criteria for a strong password and create one using a recommended method.
Explain the purpose and function of Two-Factor Authentication (2FA).
Analyze a suspicious email or message for signs of a phishing attempt.
Describe the importance of regular software updates for device security.
Define the core security principles of confidentiality, integrity, and availability (CIA Triad).
Ever had a friend's social media account get hacked and start sending weird messages? 😱 Let's learn how to stop that from happening to you!
In this chapter, we'll explore the basics of digital defense to protect your personal information on your computer and phone. You&#...
2
Key Concepts & Vocabulary
TermDefinitionExample
MalwareShort for 'malicious software,' it's any software intentionally designed to cause damage to a computer, server, client, or computer network. It's a general term for viruses, spyware, ransomware, and more.You download a 'free' game from a sketchy website, but it secretly installs a keylogger that records everything you type, including your passwords.
PhishingA type of social engineering attack where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information or to deploy malicious software.Receiving an email that looks like it's from your bank, asking you to 'verify your account' by clicking a link and entering your password on a fake website.
Two-Factor Authentication (2FA)...
3
Core Syntax & Patterns
Password Strength Pattern
A strong password should have: 1. Length (12+ characters), 2. Complexity (uppercase, lowercase, numbers, symbols), and 3. Uniqueness (not used for other accounts).
Use this pattern whenever creating a new password for any account. A simple way to achieve this is the 'passphrase method': combine 3-4 random, unrelated words and add complexity (e.g., 'Correct!Horse-Battery-Staple9'). This is easier to remember than random characters but much harder for a computer to guess.
Principle of Least Privilege (PoLP)
Grant an application or user only the minimum levels of access – or permissions – necessary to perform its function.
When installing a new app on your phone, apply this principle. If a simple calculator app asks for permission t...
4 more steps in this tutorial
Sign up free to access the complete tutorial with worked examples and practice.
Sign Up Free to ContinueSample Practice Questions
Challenging
A student has the following digital habits: 1) Uses the same simple password 'Summer2024!' for all accounts. 2) Enables 2FA on their email. 3) Frequently connects to public Wi-Fi without a VPN. 4) Ignores software update notifications on their phone. Which of these habits represents the MOST critical security risk to all of their accounts?
A.Ignoring software updates, as it could lead to a device-level compromise.
B.Using public Wi-Fi, as it exposes their traffic.
C.Reusing a weak password, as a breach on one minor site could compromise their most important accounts.
D.Enabling 2FA, as it is too complicated to manage.
Challenging
A company's secret project files are stolen by a competitor, but the original files on the company's server are left untouched and unchanged. Which principle of the CIA Triad has failed, and which security measure from the tutorial would have been most effective at preventing this specific failure?
A.Integrity; Firewall
B.Confidentiality; Encryption
C.Availability; Software Updates
D.Confidentiality; Firewall
Challenging
An employee receives a phishing email disguised as a message from IT, asking them to log into a new 'secure portal' to update their password. The employee clicks the link and enters their current credentials. The company had recently conducted a security training on phishing. What was the ultimate root cause of this security breach?
A.The company's firewall failed to block the email.
B.The employee's password was not strong enough.
C.The company did not have Two-Factor Authentication (2FA) enabled.
D.The failure of the human element to apply their security training.
Want to practice and check your answers?
Sign up to access all questions with instant feedback, explanations, and progress tracking.
Start Practicing Free