Page 17 - Cyber Safety C-5
P. 17
Install antivirus software: Detects and removes malware, providing real-time
protection.
Avoid clicking on suspicious links: Prevents exposure to malicious sites or
phishing attempts.
Use strong passwords: Protects accounts from malware targeting weak or
reused passwords.
Enable firewall protection: Blocks malicious traffic from accessing your device.
Be careful with external devices: Prevents malware from spreading via
unknown USB drives or external hardware.
quick
Tick () if you know this:
1. Some websites may trick individuals into sharing personal information.
2. The Internet can expose people to content that isn’t suitable for all ages.
3. Hidden threats are often designed to look harmless or even beneficial.
21 st
Century #Media Literacy
Skills
Scan the QR code or watch the following video on Malware: Difference Between
Computer Viruses, Worms and Trojans at:
https://youtu.be/n8mbzU0X2nQ?si=vgk1CEpE3eWPzdM_
Answer the following questions:
What is a computer virus?
How does a Trojan differ from viruses and worms?
INTERACTING WITH UNKNOWNS ON THE INTERNET
The Internet allows people to connect from all over the world, but just like in the real
world, not everyone online can be trusted. Meeting strangers online can seem fun,
but it also comes with risks.
Hidden Threats in the Online World 15

