Domain 7 Lesson 2 Workbook 2
Domain 7 Lesson 2 Workbook 2
104 | Domain 7 Lesson 2: Negative Media Posts IC3 GS6 Level 2 Project Workbook, First Edition
Fill-in-the-Blanks
Instructions: While watching Domain 7 Lesson 2, fill in the missing words according to the information presented by the
instructor. [References are found in the brackets.]
1. AutoRun or AutoPlay should be disabled to prevent removable media from running without permission.
[Identify Untrusted Media Devices]
2. Malware can spread via removable media. [Identify Untrusted Media Devices]
3. Encryption uses an algorithm to convert plaintext into an unreadable format called cipher text . [Define
Encryption]
4. Asymmetric-key encryption uses a private key and a public key in its encryption processes. [Define
Encryption]
5. Users can block access to their camera in a Google Chrome browser within the privacy and security on site settings
settings. [Blocking Camera Access]
6. Windows controls access to the camera for the Microsoft Edge browser. [Blocking Camera Access]
7. Microsoft Word files are encrypted with a password within the info of the File tab. [Password
Protection File Options]
8. Microsoft Office encrypted files cannot be recovered if the password is forgotten. [Password
Protection File Options]
9. The Restrict Editing feature in Microsoft Word is located on the review tab. [Explain Editing
Restrictions]
10. To implement editing protection within the Restrict Editing feature, users must select Yes, Start Enforcing
Protection, and create a password . [Explain Editing Restrictions]
105 | Domain 7 Lesson 2: Fill-in-the-Blanks IC3 GS6 Level 2 Project Workbook, First Edition
Untrusted Removable Media Project Details
Project file
Removable media poses a security threat to the computer because it could N/A
contain malware. Connecting removable media opens the door for any malware
Estimated completion time
to transfer from the device onto the computer. If users are unsure where the
5 minutes
removable media came from, they should avoid connecting it to their computer.
Video reference
Purpose Domain 7
Topic: Understand Device Security
Upon completing this project, you will be familiar with the various types of Subtopic: Identify Untrusted
removable media. Media Devices
106 | Domain 7 Lesson 2: Untrusted Removable Media IC3 GS6 Level 2 Project Workbook, First Edition
Encryption Project Details
Project file
The purpose of encryption is to keep communication and data secure online by N/A
making text unreadable. It uses an algorithm to convert plaintext into ciphertext.
Estimated completion time
The data remains unreadable until it undergoes a decryption process, which
5 minutes
converts the ciphertext back to plaintext. The receiver must have the correct key
to decrypt the data. Video reference
Domain 7
Purpose Topic: Understand Device Security
Subtopic: Define Encryption
Upon completing this project, you will understand what encryption is and how
Objectives covered
popular encryption processes work.
7 Safety and Security
7.3 Understand device security
Steps for Completion 7.3.2 Define device encryption and
identify encryption methods
1. Public-key encryption is also known as asymmetric-key
encryption. Notes for the teacher
Review asymmetric-key encryption and
2. Which encryption process requires a secret key installed on both the symmetric-key encryption. Questions 4
sender’s and receiver’s computers? and 5 will vary as each student will
create their own encryption.
a. Symmetric-key encryption
a. Public-key/Assymetric-key encryption
4. Create a basic encryption using the alphabet and either numbers or symbols in the blank spaces below.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
z Y X W V U T S R Q P O N M L K J I H G F E D C B A
5. Using the encryption you created, how would your name be spelled using the ciphertext?
a. ISVAZ
107 | Domain 7 Lesson 2: Encryption IC3 GS6 Level 2 Project Workbook, First Edition
Block Camera Access Project Details
Project file
It is good practice for users to block access to their webcam when it is not in N/A
use. Blocking access to the webcam prevents hackers and websites from spying
Estimated completion time
through the webcam. Users can block access through web browsers or within
5 minutes
the computer’s settings.
Video reference
Purpose Domain 7
Topic: Understand Device Security
Upon completing this project, you will know how to block camera access. Subtopic: Blocking Camera Access
108 | Domain 7 Lesson 2: Block Camera Access IC3 GS6 Level 2 Project Workbook, First Edition
Password Protect a File Project Details
Project file
Users can protect files using encryption to prevent others from viewing the file 741.docx
without permission. In Microsoft programs, users encrypt individual files using a
Estimated completion time
password. An alternative option on some Windows computers is to encrypt files
5 minutes
with a password. Users can implement this option through the file's Properties.
Video reference
Purpose Domain 7
Topic: Understand File Security
Upon completing this project, you will know how to encrypt a document with a Subtopic: Password Protection File
password. Options
109 | Domain 7 Lesson 2: Password Protect a File IC3 GS6 Level 2 Project Workbook, First Edition
Editing Restrictions Project Details
Project file
Document owners use the Restrict Editing feature in Microsoft Word to control 742.docx
how others can format and leave feedback within their documents. They can
Estimated completion time
limit formatting to a selection of styles within the whole document, a section, or
5 minutes
for specific individuals. They can also limit the type of feedback to no changes,
comments, filling in forms, or tracked changes. Video reference
Domain 7
Purpose Topic: Understand File Security
Subtopic: Explain Editing
Upon completing this project, you will know how to implement editing Restrictions
restrictions on a Microsoft Word document.
Objectives covered
7 Safety and Security
Steps for Completion 7.4 Understand file security
7.4.2 Explain editing restrictions
1. Open the file 742.docx found in your Domain 7 Student folder.
Notes for the teacher
2. Restrict editing to the document’s header and footer. The reference project, 742-Finished, is
in the Finished folder. The file should
a. Do not remove existing formatting styles.
have editing restrictions on the header
3. Restrict the editing of the document to Tracked changes. and footer formatting and should only
allow tracked changes.
4. Accept all other defaults.
110 | Domain 7 Lesson 2: Editing Restrictions IC3 GS6 Level 2 Project Workbook, First Edition