0% found this document useful (0 votes)
69 views7 pages

Domain 7 Lesson 2 Workbook 2

This document provides a lesson on negative media posts and device security. It includes fill-in-the-blank questions about identifying untrusted media devices, defining encryption, and blocking camera access. It also includes projects on untrusted removable media, encryption, and blocking camera access.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views7 pages

Domain 7 Lesson 2 Workbook 2

This document provides a lesson on negative media posts and device security. It includes fill-in-the-blank questions about identifying untrusted media devices, defining encryption, and blocking camera access. It also includes projects on untrusted removable media, encryption, and blocking camera access.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Domain 7 Lesson 2

104 | Domain 7 Lesson 2: Negative Media Posts IC3 GS6 Level 2 Project Workbook, First Edition
Fill-in-the-Blanks
Instructions: While watching Domain 7 Lesson 2, fill in the missing words according to the information presented by the
instructor. [References are found in the brackets.]

1. AutoRun or AutoPlay should be disabled to prevent removable media from running without permission.
[Identify Untrusted Media Devices]

2. Malware can spread via removable media. [Identify Untrusted Media Devices]

3. Encryption uses an algorithm to convert plaintext into an unreadable format called cipher text . [Define
Encryption]

4. Asymmetric-key encryption uses a private key and a public key in its encryption processes. [Define
Encryption]

5. Users can block access to their camera in a Google Chrome browser within the privacy and security on site settings
settings. [Blocking Camera Access]

6. Windows controls access to the camera for the Microsoft Edge browser. [Blocking Camera Access]

7. Microsoft Word files are encrypted with a password within the info of the File tab. [Password
Protection File Options]

8. Microsoft Office encrypted files cannot be recovered if the password is forgotten. [Password
Protection File Options]

9. The Restrict Editing feature in Microsoft Word is located on the review tab. [Explain Editing
Restrictions]

10. To implement editing protection within the Restrict Editing feature, users must select Yes, Start Enforcing
Protection, and create a password . [Explain Editing Restrictions]

105 | Domain 7 Lesson 2: Fill-in-the-Blanks IC3 GS6 Level 2 Project Workbook, First Edition
Untrusted Removable Media Project Details
Project file
Removable media poses a security threat to the computer because it could N/A
contain malware. Connecting removable media opens the door for any malware
Estimated completion time
to transfer from the device onto the computer. If users are unsure where the
5 minutes
removable media came from, they should avoid connecting it to their computer.
Video reference
Purpose Domain 7
Topic: Understand Device Security
Upon completing this project, you will be familiar with the various types of Subtopic: Identify Untrusted
removable media. Media Devices

Steps for Completion Objectives covered


7 Safety and Security
1. List four types of removable media. 7.3 Understand device security
7.3.1 Identify methods of
a. USB Drives protecting against untrusted
portable media device
b. SD card
Notes for the teacher
c. CD'S Discuss the potential dangers of
removable media and how safety
d. DVD'S measures can be implemented to
protect the computer. Answers to
2. Disable the AutoRun or AutoPlay question 1 may vary. Other potential
feature to prevent media devices from automatically running when answers may include external hard
connected to the computer. drives, Zip disks, Blu-Ray discs, and
smartphones.

106 | Domain 7 Lesson 2: Untrusted Removable Media IC3 GS6 Level 2 Project Workbook, First Edition
Encryption Project Details
Project file
The purpose of encryption is to keep communication and data secure online by N/A
making text unreadable. It uses an algorithm to convert plaintext into ciphertext.
Estimated completion time
The data remains unreadable until it undergoes a decryption process, which
5 minutes
converts the ciphertext back to plaintext. The receiver must have the correct key
to decrypt the data. Video reference
Domain 7
Purpose Topic: Understand Device Security
Subtopic: Define Encryption
Upon completing this project, you will understand what encryption is and how
Objectives covered
popular encryption processes work.
7 Safety and Security
7.3 Understand device security
Steps for Completion 7.3.2 Define device encryption and
identify encryption methods
1. Public-key encryption is also known as asymmetric-key
encryption. Notes for the teacher
Review asymmetric-key encryption and
2. Which encryption process requires a secret key installed on both the symmetric-key encryption. Questions 4
sender’s and receiver’s computers? and 5 will vary as each student will
create their own encryption.
a. Symmetric-key encryption

3. Which encryption process uses two keys at once to encrypt data on


both the sender’s and receiver’s computers?

a. Public-key/Assymetric-key encryption

4. Create a basic encryption using the alphabet and either numbers or symbols in the blank spaces below.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

z Y X W V U T S R Q P O N M L K J I H G F E D C B A
5. Using the encryption you created, how would your name be spelled using the ciphertext?

a. ISVAZ

107 | Domain 7 Lesson 2: Encryption IC3 GS6 Level 2 Project Workbook, First Edition
Block Camera Access Project Details
Project file
It is good practice for users to block access to their webcam when it is not in N/A
use. Blocking access to the webcam prevents hackers and websites from spying
Estimated completion time
through the webcam. Users can block access through web browsers or within
5 minutes
the computer’s settings.
Video reference
Purpose Domain 7
Topic: Understand Device Security
Upon completing this project, you will know how to block camera access. Subtopic: Blocking Camera Access

Steps for Completion Objectives covered


7 Safety and Security
1. Navigate to the computer’s settings. 7.3 Understand device security
7.3.3 Explain when blocking
2. Open Privacy settings. camera access is appropriate and
necessary
3. Turn off the Allow apps to access your camera toggle.
Notes for the teacher
4. Take a screenshot of the Allow apps to access your camera toggle. The reference project, 733-Finished, is
in the Finished folder. It should include
5. Save the screenshot as 733-Completed.png to your Domain 7 Student a screenshot showing the Allow apps to
folder. access your camera toggle turned off.
Go over the different ways to block
access to a webcam.

108 | Domain 7 Lesson 2: Block Camera Access IC3 GS6 Level 2 Project Workbook, First Edition
Password Protect a File Project Details
Project file
Users can protect files using encryption to prevent others from viewing the file 741.docx
without permission. In Microsoft programs, users encrypt individual files using a
Estimated completion time
password. An alternative option on some Windows computers is to encrypt files
5 minutes
with a password. Users can implement this option through the file's Properties.
Video reference
Purpose Domain 7
Topic: Understand File Security
Upon completing this project, you will know how to encrypt a document with a Subtopic: Password Protection File
password. Options

Steps for Completion Objectives covered


7 Safety and Security
1. Open the file 741.docx found in your Domain 7 Student folder. 7.4 Understand file security
7.4.1 Identify password protection
2. Use the password LearnKey to encrypt the document. file options

3. Save the encrypted document as 741-Completed Notes for the teacher


The reference project, 741-Finished, is
in the Finished folder. The file should
contain a document that is password
protected.

109 | Domain 7 Lesson 2: Password Protect a File IC3 GS6 Level 2 Project Workbook, First Edition
Editing Restrictions Project Details
Project file
Document owners use the Restrict Editing feature in Microsoft Word to control 742.docx
how others can format and leave feedback within their documents. They can
Estimated completion time
limit formatting to a selection of styles within the whole document, a section, or
5 minutes
for specific individuals. They can also limit the type of feedback to no changes,
comments, filling in forms, or tracked changes. Video reference
Domain 7
Purpose Topic: Understand File Security
Subtopic: Explain Editing
Upon completing this project, you will know how to implement editing Restrictions
restrictions on a Microsoft Word document.
Objectives covered
7 Safety and Security
Steps for Completion 7.4 Understand file security
7.4.2 Explain editing restrictions
1. Open the file 742.docx found in your Domain 7 Student folder.
Notes for the teacher
2. Restrict editing to the document’s header and footer. The reference project, 742-Finished, is
in the Finished folder. The file should
a. Do not remove existing formatting styles.
have editing restrictions on the header
3. Restrict the editing of the document to Tracked changes. and footer formatting and should only
allow tracked changes.
4. Accept all other defaults.

5. Enforce the protection using the password 12345

6. Save the document as 742-Completed

110 | Domain 7 Lesson 2: Editing Restrictions IC3 GS6 Level 2 Project Workbook, First Edition

You might also like