Module 9 - Cyberspace
Module 9 - Cyberspace
CYBERSECURITY,
SOCIAL MEDIA LITERACY
CONTENT STANDARDS:
The learners demonstrate an understanding of the legal,
ethical, and societal issues in the use of media and
information.
PERFORMANCE STANDARDS:
The learners shall be able to evaluate a case study or presentation on an offense,
investigation, and decision on any of the issues in media and information within
their community.
LEARNING OBJECTIVES:
At the end of the lesson, the learners should be able to:
Understand the current threat landscape
Determine the potential risks and threats in cyberspace
Use and explore cyberspace and social media safely and responsibly.
Understand and critically evaluate information from social media
Recognize the limits of one’s knowledge and explore new kinds of
reasoning and questioning
Identify common logical fallacies on social media
Page 1 of 11
TESTER. Read and understand each scenario, and in 2-3 sentences, describe
how you will respond to each. 3 items.
1. You received and e-mail from someone you don’t know with a file
attached, what are you going to do?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
2. Someone online asked you to send them your picture, they sent you a picture first
to encourage you to trust them. What should you do?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
3. If someone online sends you a message that does not make you feel comfortable,
what should you do?
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
In all the three items, your priority should be your safety and it is crucial that you
know what to do and how to act online. If you sense danger online, trust your instincts. If
you know how to respond or deal with the situations above, good for you! If you are still
quite unsure on what to do , you need to be more cautious moving forward. Either way,
we are here to help you.
Welcome to Module 9! In your previous modules, some of the threats and risks and
how to maintain a positive well-being online were already discussed. We are going to
dig deeper and have a different approach in the concept.
THREAT LANDSCAPE
Page 2 of 11
In a study published by Djambazova (2011) explained that, a threat is any
indication, circumstance, or event with the potential to cause harm to an ICT
Infrastructure and the assets that depend on this infrastructure. With that being said,
institutions and individuals must not only be aware but also have a clear understanding
of the Cyber threat landscape. It includes knowing what type of attacks or threats exist
and setting up a strong or appropriate cyber defense plan.
Every nation confronts a different risk or threat. In an issue released by Techwire Asie,
August 2020, cyber crime in the Philippines increased by 200% since the lockdown in
March. Phishing has dominated the cyber threat landscape. Malware, ransomware,
and data corruption are also some of the struggles in business institutions.
AUTHENTICATION
In the latest report in March 2020, the Philippines has kept its title as the Social Media
Capital of the World for five (5) years straight. With our growing dependence and
presence on the cyberspace. How do we keep our data secured?
It was mentioned in previous discussions that you should not post everything online. It
is to save you from giving out too much information that can actually endanger your
safety and/or your identity. Additionally, we need to explore and maximize the process
of two-factor authentication (TFA). This option is available for most of the social media
platforms that we use including Google and Facebook.
Page 3 of 11
Why do we need to use TFA?
This is for us to have an extra layer of security. Most people
only have one layer – their password – to protect their account.
With 2-Step Verification, if a bad guy hacks through your
password layer, he'll still need your phone or Security Key to get
into your account.
MALWARE
Page 4 of 11
your computer's keyboard. With this information, a hacker can work out your username
and password for a range of sites without even seeing what comes up on the screen.
This is seen as a financial threat since your sensitive information such as your
passwords and banking information can be tracked or captured.
Both spyware and keyloggers are used in malicious attacks like identity
theft, phishing and social engineering - threats designed to steal money from
unsuspecting computer users, businesses and banks.
This is not to scare you but be very careful with the sites you go and software
you download. Do not open and email from unrecognized sources. Immediately
delete an email especially those that contains links. NEVER click on those links.
ALWAYS, ALWAYS, ALWAYS be mindful of your activities online, remember they can see
your trails. Who knows who is watching your every move?
SOCIAL MEDIA
2. Media messages are constructed using 2. What creative technique are used to
a creative language with its own rules. attract my attention?
Page 5 of 11
3. Different people experience the same 3. How might different people understand
media message differently. the message differently?
4. What values, lifestyles, and points of
4. Media have embedded values and
view are represented in, omitted from, this
points of view.
message?
5. Most media messages are organized to
5. Why is this message being sent?
gain profit and/or power.
Who is the “target audience”? What are the clues (words, images, sounds,
QUESTIONS
etc.)?
BASIC
Who is the “target audience”? What is their age, ethnicity, class, profession,
interests, etc.? What words, images or sounds suggest this?
What is the “text” of the message? (What we actually see and/or hear:
written or spoken words, photos, drawings, logos, design, music, sounds,
etc.)
What is the “subtext” of the message? (What do you think is the hidden or
unstated meaning?)
What “tools of persuasion” are used?
What positive messages are presented? What negative messages are
presented?
What part of the story is not being told?
Page 6 of 11
1. Whose message is this? Who created or paid for it? Why?
2. Who is the “target audience”? What is their age, ethnicity, class, profession,
interests, etc.? What words, images or sounds suggest this?
ADVANCED DECONSTRUCTION QUESTIONS
3. What is the “text” of the message? (What we actually see and/or hear:
written or spoken words, photos, drawings, logos, design, music, sounds, etc.)
4. What is the “subtext” of the message? (What do you think is the hidden or
unstated meaning?)
5. What kind of lifestyle is presented? Is it glamorized? How?
6. What values are expressed?
7. What “tools of persuasion” are used?
8. What positive messages are presented? What negative messages are
presented?
9. What groups of people does this message empower? What groups does it
disempower? How does this serve the media maker's interests?
What part of the story is not being told? How and where could you get more
information about the untold stories?
It is best that every time you go online make it a habit to ask yourself these questions first
before believing, reacting, commenting.
MUDDIEST PART: How’s it going? I hope you were able to pick something
up on this module. On this part, share what topic seems the most unclear
or ‘muddiest.” Explain what makes it unclear or what do you want to be
explained more.
____________________________________________________________
_____________________________________________________________________
__________________________________________________________________________
_________________________________________________________________________
________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________
Page 7 of 11
REFERENCES:
Alagaran, J.R, II. (2017). Media and information literacy: Empower the discerning
audiences. Quezon City: Abiva Publishing House.
Alhaji Idi Babate, Maryam Abdullahi Musa, Aliyu Musa Kida, Musa Kalla Saidu.
(2015)State of Cyber Security: Emerging Threats Landscape. International Journal
of Advanced Research in Computer Science & Technology (IJARCST 2015). Vol.
3, Issue 1. ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print),
http://ijarcst.com/doc/vol3issue1/ver2/alhaji.pdf
Boyd, Danah & Ellison, Nicole. (2007). Social Network Sites: Definition, History, and
Scholarship. J. Computer-Mediated Communication. 13. 210-230.
10.1111/j.1083-6101.2007.00393.x. .
https://www.researchgate.net/publication/220438020_Social_Network_Sites_Defi
nition_History_and_Scholarship
Djambazova, E., Almgren, M., Dimitrov, K., & Jonsson, E. (2010). Emerging and Future
Cyber Threats to Critical Systems.
http://dl.ifip.org/db/conf/ifip114/inetsec2010/DjambazovaADJ10.pdf
What are spyware, keyloggers, and adware? New Mexico State University.
Retrieved from: https://kb.nmsu.edu/page.php?id=80416
Wilson Carolyn and Alton Grizzle. 2011. UNESCO Media and Information Literacy
Curriculum for Teachers. Accessed on February 9, 2014.
http://www.unesco.org/new/en/communication-and-
information/resources/publicationsand-communication-
materials/publications/full- list/media-and-information-literacy-curriculum-for-
teachers/
Page 8 of 11
Media and Information Literacy
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section:
Email: [email protected]; Website: www.uc-bcf.edu.ph
MODULE 9 - Cybersecurity
Subject Teacher: Lory Rose B. Supsupin
and Social Media Literacy
Multiple Choice. Read and understand each statement. Choose the letter that
corresponds to the correct answer. (15 items, 1 point each)
1. You received an email from your bank, telling you that your account has been
compromised and you need to validate your account details or else your account will
be closed. You are supposed to click a link to validate your information. Which tactic
was applied here?
A. Phishing C. Scamming
B. Ransomware D. Spyware
2. You have been using your your computer for your personal transactions when your IT
security recently found a program on the computer that tracked all of the words typed
into the computer. What kind of malware is this?
A. Keyblogger C. Spyware
B. Keylogger D. Trojan
3. Rose just installed a new search engine on her laptop.now whenever she searches
the internet, she gets several pop-up windows directing her to buy products.what does
rose have?
Malware is used to describe all types of bad software. Malware is a combination of
what two words?
A. Magnificent and software C. Marketing and software
B. Malicious and software D. Normal and adware
5. What is the software called which when get downloaded on computer scans your
hard drive for personal information and your internet browsing habits?
A. Backdoors C. Malware
B. Key-logger D. Spyware
6. Which of the following serves as an extra layer of protection used to ensure the
security of online accounts beyond just a username and password.
A. Antivirus C. Rootkit
B. Google Security D. Two-factor Authentication
Page 9 of 11
8. Media is business. Which core concept supports this?
A. Different people experience the same media message differently.
B. Media have embedded values and points of view.
C. Media messages are constructed using a creative language with its own rules.
D. Most media messages are organized to gain profit and/or power.
9. Which term below refers to all bad software including viruses, worms, Trojan
Horses, rootkits, spyware, keyloggers?
A. Badware C. Ransomware
B. Malware D. Spyware
10. The goal of media is not to force that a point of view is the “correct” interpretation.
It acknowledges variations of concepts and meaning based on backgrounds. Which
social media key concept states this?
A. Different people experience the same media message differently.
B. Media have embedded values and points of view.
C. Media messages are constructed using a creative language with its own rules.
D. Most media messages are organized to gain profit and/or power.
Choose 1 socio-political news/issue you can see on your social media account.
Select 2 varying approach or point of view on the issue/news. Use the questions below
to help you determine how valid a news story is that is found on social media. Include
the link of the news/news article.Answer the following guide questions in an essay 250
words maximum per approach or point of view. (50 points)
Criteria 5 4 3 2
The essay is The essay is The essay is The essay poorly
focused, focused on the focused on topic addresses topic
Focus/ Main Point purposeful, and topic and includes and includes few and includes
reflects clear relevant ideas loosely related irrelevant ideas
insight and ideas ideas
Persuasively Supports main Supports main Provides little or no
supports main point with point with some support for the
Support point with well developed reasons underdeveloped main point
developed reasons and/or examples reasons and/or
and/or examples examples
Effectively Organizes ideas to Some organization Little or no
organizes ideas to build an argument of ideas to build an organization of
Organization & build a logical, argument ideas to build an
Format coherent argument
(Paragraphs, argument
Transitions)
Page 10 of 11
Effective and Appropriate use of Some use of Little or no use of
Language Use,
creative use of elements of style elements of style elements of style
Style &
elements of style to Uses correct Contains frequent Many errors in
Conventions
enhance meaning grammar, spelling, errors in grammar, grammar, spelling,
(Sentence
Uses correct and punctuation spelling, and and punctuation,
structure, word
grammar, spelling, with few errors punctuation makes reader’s
choice, grammar,
punctuation comprehension
spelling,
throughout with difficult
punctuation)
very few errors
Distinctive Sufficient Very little No
experimentation experimentation experimentation to experimentation
with language and with language and enhance concepts nor enhancement
usage to enhance usage to enhance Does not exhibit of concepts No
concepts Applies concepts Applies creativity and adherence to the
Originality
higher order basic creative skills critical thinking theme
thinking and to relay ideas
creative skills to
relay complex
ideas
Prepared by;
Page 11 of 11