Technology alone cannot keep a network and data from the people who use it safe. Threats to devices, networks, and data require a multi-faceted approach that includes informed users. A security breach can occur from something as simple as sharing a password, or watching someone type their password in. People, not technology, often pose security threats. You and every user on your network should understand how they can defend themselves against these types of security breaches, often called social engineering attacks.
Sometimes these threats are annoying, like all the spam phone calls you might get in a day or when a network becomes overloaded and you can't get to the information you want. Other times, it can become costly, like when a device–or sometimes multiple devices on the same network–are corrupted by a virus or even taken over by ransomware. The latter essentially shuts down an entire school network and all the devices on it. Some organizations, including school districts, have had to pay many thousands of dollars in "ransom" to regain access to their network and the data it houses.
There are also technology supports for defending devices and data from malicious software (malware). You should understand common technology defenses and how to use them on your own school or district devices and how to help others implement them as a member of the Help Desk. You may also help users take steps to back up their information securely and have a plan for when they may have to restore data. Hopefully, it is only a temporary loss.
Note: This Unit may not need a full three weeks as some of the security threats and solutions overlap, especially behavioral solutions. If there were previous topics that need additional review, such as exploring databases in Unit 2, this unit might be shortened to allow for additional topics.
Have you ever played a game where you pretended to be someone else? What if it wasn't a game, and someone was pretending to be you? That could be serious. Whether you want to think about it or not, there are a lot of people who are engaging in behaviors that cause threats to you and others when using a network, including your school or district network. What would it mean to you if you couldn't use computers provided by your school or district or could not access the network? What steps are you taking to secure your own personal devices and information?
What strategies can be used to keep devices, networks, and the data they house safe and secure from security threats? How can you and others defend yourself against social engineering attacks that threaten to obtain your personally identifiable information (PII)?
Students create documentation to support Help Desk representatives understand how to configure and monitor security on devices and the network and how to be better prepared to combat social engineering attacks.
Monday
Introduction to problem: Protection against social engineering and malware attacks
Online Pre-assessment (available for student practice, as well)
Team meetings to develop project plan and goals
Tuesday
Review content resources with whole group
Small group and independent exploration of resources
Contribute to team project
Wednesday
Hands-on exploration with IT professionals: school/district policies and resources use to protect devices, the network, and data
Team progress check with supervisor (using project plan)
Thursday
Hands-on exploration with IT professionals: school/district policies and resources use to protect devices, the network, and data
Small group and independent exploration of resources
Contribute to team project
Friday
Team sharing of progress with whole group
Online post-assessment
Monitor progress and adjust project plan as necessary
Students work in teams to review Units 5.1 and 5.2 in their textbook. The students collaborate on adding to their Frayer-type digital presentation or other documentation that records and illustrates key vocabulary and concepts in the Units. Students contribute to these files throughout the semester to prepare for the CompTIA certification exam and to contribute to the Help Desk knowledge base.
Student teams work together to create documentation that helps the Help Desk representatives and the users on the school or district network better understand both social engineering attacks and common malware threats and strategies they can use to defend themselves from these attacks when using school or district hardware or network resources.
Technicians demonstrate or model standard technology solutions encouraged or required by the school or district to help secure devices and data. They should share acceptable resources, such as accepted file sharing services, as well as those that should not be used on the network. They may want to share how they handle violations by users when to do use less secure resources.
The Official CompTIA ITF+ Instructor's Manual and Student Guide: Units 5.1 and 5.2
Frayer Diagram Template (slide deck, document, or other)
CyberWise offers a range of supports for parents and teachers on a full range of topics related to digital citizenship
Infographic on identifying and avoiding phishing attacks from TechRepublic
10 Easy Ways to Prevent Malware Infection by Wendy Zamora for Malwarebytes Labs
ITProTV: (Note: Could be distributed across three weeks)
Khan Academy
Technology Gee