0% found this document useful (0 votes)
85 views

Module 9 - Cyberspace

The document discusses cybersecurity, cyberspace, and social media literacy. It outlines content and performance standards related to understanding legal, ethical, and social issues related to media and information use. Learning objectives include understanding current cyber threats and risks, using cyberspace and social media safely, critically evaluating social media information, and recognizing the limits of one's knowledge.

Uploaded by

Thompson Guyon
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

Module 9 - Cyberspace

The document discusses cybersecurity, cyberspace, and social media literacy. It outlines content and performance standards related to understanding legal, ethical, and social issues related to media and information use. Learning objectives include understanding current cyber threats and risks, using cyberspace and social media safely, critically evaluating social media information, and recognizing the limits of one's knowledge.

Uploaded by

Thompson Guyon
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CYBERSPACE,

CYBERSECURITY,
SOCIAL MEDIA LITERACY

CONTENT STANDARDS:
 The learners demonstrate an understanding of the legal,
ethical, and societal issues in the use of media and
information.

PERFORMANCE STANDARDS:
 The learners shall be able to evaluate a case study or presentation on an offense,
investigation, and decision on any of the issues in media and information within
their community.

LEARNING OBJECTIVES:
At the end of the lesson, the learners should be able to:
 Understand the current threat landscape
 Determine the potential risks and threats in cyberspace
 Use and explore cyberspace and social media safely and responsibly.
 Understand and critically evaluate information from social media
 Recognize the limits of one’s knowledge and explore new kinds of
reasoning and questioning
 Identify common logical fallacies on social media

Page 1 of 11
TESTER. Read and understand each scenario, and in 2-3 sentences, describe
how you will respond to each. 3 items.
1. You received and e-mail from someone you don’t know with a file
attached, what are you going to do?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

2. Someone online asked you to send them your picture, they sent you a picture first
to encourage you to trust them. What should you do?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

3. If someone online sends you a message that does not make you feel comfortable,
what should you do?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

In all the three items, your priority should be your safety and it is crucial that you
know what to do and how to act online. If you sense danger online, trust your instincts. If
you know how to respond or deal with the situations above, good for you! If you are still
quite unsure on what to do , you need to be more cautious moving forward. Either way,
we are here to help you.

Welcome to Module 9! In your previous modules, some of the threats and risks and
how to maintain a positive well-being online were already discussed. We are going to
dig deeper and have a different approach in the concept.

THREAT LANDSCAPE

A threat landscape is a collection of different threats, risks, or danger in an


environment. It is also called the “threat environment.” In this case, we are looking into
the Cyber threat landscape, or the threats and risks in the Cyberspace.

Page 2 of 11
In a study published by Djambazova (2011) explained that, a threat is any
indication, circumstance, or event with the potential to cause harm to an ICT
Infrastructure and the assets that depend on this infrastructure. With that being said,
institutions and individuals must not only be aware but also have a clear understanding
of the Cyber threat landscape. It includes knowing what type of attacks or threats exist
and setting up a strong or appropriate cyber defense plan.

Every nation confronts a different risk or threat. In an issue released by Techwire Asie,
August 2020, cyber crime in the Philippines increased by 200% since the lockdown in
March. Phishing has dominated the cyber threat landscape. Malware, ransomware,
and data corruption are also some of the struggles in business institutions.

AUTHENTICATION

In the latest report in March 2020, the Philippines has kept its title as the Social Media
Capital of the World for five (5) years straight. With our growing dependence and
presence on the cyberspace. How do we keep our data secured?

It was mentioned in previous discussions that you should not post everything online. It
is to save you from giving out too much information that can actually endanger your
safety and/or your identity. Additionally, we need to explore and maximize the process
of two-factor authentication (TFA). This option is available for most of the social media
platforms that we use including Google and Facebook.

Page 3 of 11
Why do we need to use TFA?
This is for us to have an extra layer of security. Most people
only have one layer – their password – to protect their account.
With 2-Step Verification, if a bad guy hacks through your
password layer, he'll still need your phone or Security Key to get
into your account.

MALWARE

Malware is a shortened term for “Malicious Software.“ The term malware


includes viruses, worms, Trojan Horses, rootkits, spyware, keyloggers and more. To get an
overview of the difference of all these types of threats and the way they work, let me
discuss these to you. You might have already encountered these in your Empowerment
Technologies but a little review won’t hurt.

Viruses and worms – the contagious threat


Viruses and worms are defined by their behaviour – malicious
software designed to spread without the user’s knowledge. A virus
infects legitimate software and when this software is used by the
computer owner it spreads the virus – so viruses need you to act
before they can spread. Computer worms, on the other hand, spread without user
action.

Trojans and Rootkits – the masked threat


Trojans and rootkits are grouped together as they both seek to
hide attacks on computers. Users sometimes download a
software or application thinking they will get a useful piece
of software and instead end up with a malware infected
computer. Rootkits are different. They are a masking technique for
malware, but do not contain damaging software. These keeps the malware hidden or
undetected by antivirus.
Spyware and keyloggers – the financial threat
Spyware is a type of malware that records your
activities. It captures and transmits personal information or
Internet browsing habits and details to companies or
cybercriminals.
A keylogger records every keystroke you make on

Page 4 of 11
your computer's keyboard. With this information, a hacker can work out your username
and password for a range of sites without even seeing what comes up on the screen.
This is seen as a financial threat since your sensitive information such as your
passwords and banking information can be tracked or captured.
Both spyware and keyloggers are used in malicious attacks like identity
theft, phishing and social engineering - threats designed to steal money from
unsuspecting computer users, businesses and banks.

This is not to scare you but be very careful with the sites you go and software
you download. Do not open and email from unrecognized sources. Immediately
delete an email especially those that contains links. NEVER click on those links.
ALWAYS, ALWAYS, ALWAYS be mindful of your activities online, remember they can see
your trails. Who knows who is watching your every move?

SOCIAL MEDIA

While a variety of definitions of Social Media been


suggested, one of the easiest definition is by Boyd & Ellison
(2008), Social Media is defined as websites which allow profile
creation and visibility of relationships between users. Simply
said, social media refers to any website or application that enables users to create and
share content or to participate in social networking. Most common social media
platform global is Facebook.

List of Countries where Facebook is Banned/Limited


1. North Korea 6. Egypt
2. Iran 7. Syria
3. Iran 8. Mauritius
4. Cuba 9. Vietnam
5. Bangladesh 10. Pakistan

SOCIAL MEDIA LITERACY

5 CORE CONCEPTS 5 KEY QUESTIONS

1. All media messages are constructed. 1. Who created this message?

2. Media messages are constructed using 2. What creative technique are used to
a creative language with its own rules. attract my attention?

Page 5 of 11
3. Different people experience the same 3. How might different people understand
media message differently. the message differently?
4. What values, lifestyles, and points of
4. Media have embedded values and
view are represented in, omitted from, this
points of view.
message?
5. Most media messages are organized to
5. Why is this message being sent?
gain profit and/or power.

We need to understand this core concepts for us to deconstruct the message


and closely examine the media message to understand it in a more critical approach.
Listed below are the questions you should be asking yourself to fully understand a
media message especially since social media is filled with information. You need to be
able to understand the messages fully.
 Whose message is this? Who created or paid for it? Why?
DECONSTRUCTION

 Who is the “target audience”? What are the clues (words, images, sounds,
QUESTIONS

etc.)?
BASIC

 What “tools of persuasion” are used?


 What part of the story is not being told?

 Whose message is this? Who created or paid for it? Why?


INTERMEDIATE DECONSTRUCTION QUESTIONS

 Who is the “target audience”? What is their age, ethnicity, class, profession,
interests, etc.? What words, images or sounds suggest this?
 What is the “text” of the message? (What we actually see and/or hear:
written or spoken words, photos, drawings, logos, design, music, sounds,
etc.)
 What is the “subtext” of the message? (What do you think is the hidden or
unstated meaning?)
 What “tools of persuasion” are used?
 What positive messages are presented? What negative messages are
presented?
 What part of the story is not being told?

Page 6 of 11
1. Whose message is this? Who created or paid for it? Why?
2. Who is the “target audience”? What is their age, ethnicity, class, profession,
interests, etc.? What words, images or sounds suggest this?
ADVANCED DECONSTRUCTION QUESTIONS

3. What is the “text” of the message? (What we actually see and/or hear:
written or spoken words, photos, drawings, logos, design, music, sounds, etc.)
4. What is the “subtext” of the message? (What do you think is the hidden or
unstated meaning?)
5. What kind of lifestyle is presented? Is it glamorized? How?
6. What values are expressed?
7. What “tools of persuasion” are used?
8. What positive messages are presented? What negative messages are
presented?
9. What groups of people does this message empower? What groups does it
disempower? How does this serve the media maker's interests?
What part of the story is not being told? How and where could you get more
information about the untold stories?

It is best that every time you go online make it a habit to ask yourself these questions first
before believing, reacting, commenting.

MUDDIEST PART: How’s it going? I hope you were able to pick something
up on this module. On this part, share what topic seems the most unclear
or ‘muddiest.” Explain what makes it unclear or what do you want to be
explained more.

____________________________________________________________
_____________________________________________________________________
__________________________________________________________________________
_________________________________________________________________________
________________________________________________________________________
___________________________________________________________________________________
___________________________________________________________________________________

Page 7 of 11
REFERENCES:

 10 countries where Facebook has been banned.


https://www.indexoncensorship.org/2014/02/10-countries-facebook-banned/

 Alagaran, J.R, II. (2017). Media and information literacy: Empower the discerning
audiences. Quezon City: Abiva Publishing House.

 Alhaji Idi Babate, Maryam Abdullahi Musa, Aliyu Musa Kida, Musa Kalla Saidu.
(2015)State of Cyber Security: Emerging Threats Landscape. International Journal
of Advanced Research in Computer Science & Technology (IJARCST 2015). Vol.
3, Issue 1. ISSN : 2347 - 8446 (Online) ISSN : 2347 - 9817 (Print),
http://ijarcst.com/doc/vol3issue1/ver2/alhaji.pdf

 Boyd, Danah & Ellison, Nicole. (2007). Social Network Sites: Definition, History, and
Scholarship. J. Computer-Mediated Communication. 13. 210-230.
10.1111/j.1083-6101.2007.00393.x. .
https://www.researchgate.net/publication/220438020_Social_Network_Sites_Defi
nition_History_and_Scholarship

 Cybercrime threat landscape in the Philippines.


https://acg.pnp.gov.ph/main/about-us/20-publications/42-cybercrime-threat-
landscape-in-the-philippines

 Deconstructing Media Messages.


https://www.youtube.com/watch?v=QJ6lzwm7nlY

 Djambazova, E., Almgren, M., Dimitrov, K., & Jonsson, E. (2010). Emerging and Future
Cyber Threats to Critical Systems.
http://dl.ifip.org/db/conf/ifip114/inetsec2010/DjambazovaADJ10.pdf

 Media and Information Literacy Curriculum Guide. Retrieved from:


http://www.deped.gov.ph/wp-content/uploads/2019/01/SHS-Core_Media-and-
Information-Literacy-CG.pdf

 Media Literacy Concepts & Skills How to Deconstruct a Media Message.


https://www.21stcenturyschools.com/uploads/2/1/5/4/21542794/deconstructing
_media_messages.pdf

 Phishing scams dominate the Philippines cybercrime landscape.


https://techwireasia.com/2020/08/phishing-scams-dominate-the-philippines-
cybercrime-landscape/

 Understanding The Cyber Threat Landscape.


https://www.itsecurityguru.org/2018/08/01/understanding-cyber-threat-
landscape/

 What are spyware, keyloggers, and adware? New Mexico State University.
Retrieved from: https://kb.nmsu.edu/page.php?id=80416

 Wilson Carolyn and Alton Grizzle. 2011. UNESCO Media and Information Literacy
Curriculum for Teachers. Accessed on February 9, 2014.
http://www.unesco.org/new/en/communication-and-
information/resources/publicationsand-communication-
materials/publications/full- list/media-and-information-literacy-curriculum-for-
teachers/

Page 8 of 11
Media and Information Literacy
Governor Pack Road, Baguio City, Philippines
2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section:
Email: [email protected]; Website: www.uc-bcf.edu.ph

MODULE 9 - Cybersecurity
Subject Teacher: Lory Rose B. Supsupin
and Social Media Literacy

Name: ______________________________________________________ Date: ___________________


Section: _____________________________________________________ Score: ________/10

Multiple Choice. Read and understand each statement. Choose the letter that
corresponds to the correct answer. (15 items, 1 point each)

1. You received an email from your bank, telling you that your account has been
compromised and you need to validate your account details or else your account will
be closed. You are supposed to click a link to validate your information. Which tactic
was applied here?
A. Phishing C. Scamming
B. Ransomware D. Spyware

2. You have been using your your computer for your personal transactions when your IT
security recently found a program on the computer that tracked all of the words typed
into the computer. What kind of malware is this?
A. Keyblogger C. Spyware
B. Keylogger D. Trojan

3. Rose just installed a new search engine on her laptop.now whenever she searches
the internet, she gets several pop-up windows directing her to buy products.what does
rose have?
Malware is used to describe all types of bad software. Malware is a combination of
what two words?
A. Magnificent and software C. Marketing and software
B. Malicious and software D. Normal and adware

4. Which of the following is a type of program that either pretends to have, or is


described as having, a set of useful or desirable features but actually contains
damaging code.
A. Adware C. Viruses
B. Trojans D. Worm

5. What is the software called which when get downloaded on computer scans your
hard drive for personal information and your internet browsing habits?
A. Backdoors C. Malware
B. Key-logger D. Spyware

6. Which of the following serves as an extra layer of protection used to ensure the
security of online accounts beyond just a username and password.
A. Antivirus C. Rootkit
B. Google Security D. Two-factor Authentication

7. What term below refers to the close examination of a media message?


A. Media construction C. Media deconstruction
B. Media core D. Social media

Page 9 of 11
8. Media is business. Which core concept supports this?
A. Different people experience the same media message differently.
B. Media have embedded values and points of view.
C. Media messages are constructed using a creative language with its own rules.
D. Most media messages are organized to gain profit and/or power.

9. Which term below refers to all bad software including viruses, worms, Trojan
Horses, rootkits, spyware, keyloggers?
A. Badware C. Ransomware
B. Malware D. Spyware

10. The goal of media is not to force that a point of view is the “correct” interpretation.
It acknowledges variations of concepts and meaning based on backgrounds. Which
social media key concept states this?
A. Different people experience the same media message differently.
B. Media have embedded values and points of view.
C. Media messages are constructed using a creative language with its own rules.
D. Most media messages are organized to gain profit and/or power.

PERFORMANCE TASK: Social Media Analysis/ Media Message Deconstruction.


Analyzing news on social media is an important skill to know and use. It requires
critical thinking, research and reading between the lines. It is important not to believe
everything you read.

Choose 1 socio-political news/issue you can see on your social media account.
Select 2 varying approach or point of view on the issue/news. Use the questions below
to help you determine how valid a news story is that is found on social media. Include
the link of the news/news article.Answer the following guide questions in an essay 250
words maximum per approach or point of view. (50 points)

1. Who produced the news and what is the purpose?


2. What information are presented and what important information do you think
are omitted or missing?
3. Is the story written to inform? entertain or persuade? What makes you think so?
4. What do you think is the hidden or unstated meaning?
5. Does the story affect your own views? Why or why not?

Criteria 5 4 3 2
The essay is The essay is The essay is The essay poorly
focused, focused on the focused on topic addresses topic
Focus/ Main Point purposeful, and topic and includes and includes few and includes
reflects clear relevant ideas loosely related irrelevant ideas
insight and ideas ideas
Persuasively Supports main Supports main Provides little or no
supports main point with point with some support for the
Support point with well developed reasons underdeveloped main point
developed reasons and/or examples reasons and/or
and/or examples examples
Effectively Organizes ideas to Some organization Little or no
organizes ideas to build an argument of ideas to build an organization of
Organization & build a logical, argument ideas to build an
Format coherent argument
(Paragraphs, argument
Transitions)

Page 10 of 11
Effective and Appropriate use of Some use of Little or no use of
Language Use,
creative use of elements of style elements of style elements of style
Style &
elements of style to Uses correct Contains frequent Many errors in
Conventions
enhance meaning grammar, spelling, errors in grammar, grammar, spelling,
(Sentence
Uses correct and punctuation spelling, and and punctuation,
structure, word
grammar, spelling, with few errors punctuation makes reader’s
choice, grammar,
punctuation comprehension
spelling,
throughout with difficult
punctuation)
very few errors
Distinctive Sufficient Very little No
experimentation experimentation experimentation to experimentation
with language and with language and enhance concepts nor enhancement
usage to enhance usage to enhance Does not exhibit of concepts No
concepts Applies concepts Applies creativity and adherence to the
Originality
higher order basic creative skills critical thinking theme
thinking and to relay ideas
creative skills to
relay complex
ideas

Prepared by;

LORY ROSE B. SUPSUPIN


SHS Faculty - Communications Cluster

Page 11 of 11

You might also like