Name of the Exercise | Risks and risking in the Digital World #1 |
---|---|
Number of participants | 1-14 |
Duration | 45 minutes |
Objective | For trainees to be aware of the potential risks related to malware, how to recognize them, how to avoid them, and how to treat them if they happen. |
How to conduct it | Connecting to topic – 5 min Trainer introduces the subject by asking the participants to shortly describe their own experience on computer malware and cyber attacking. Interaction – 10 min Trainer asks the following questions:
Open discussion is encouraged Exercise 1 - Visualize the sources of viruses – 10 min
Topics detailing - Types of malware – 5 min 1. Trainer raise question: How many types of computer malware do you know? 2. After 3-4 answers from trainees, the trainer shortly defines and classifies the computer malware: · Computer viruses · Worms · Trojan Horses · Spywares Exercise 2 - Connecting threat to risk – 10 min
|
Closing remarks | Closing – 5 min 1. Trainer makes short review of discussions 2. Trainer presents the risks of computer infection when using digital environment to prepare content |