CSS-10-QUARTER-2-Module-8- Copy
CSS-10-QUARTER-2-Module-8- Copy
Department of Education
Region III-Central Luzon
Division of Tarlac Province
TARLAC NATIONAL HIGH SCHOOL
Macabulos Drive, San Roque Tarlac City
QUARTER 2
Module 8-Week 8
(NETWORK AND SECURITY)
Technology and Livelihood Education – Information and Communications Technology
(Computer System Servicing) – Grade 10 Alternative Delivery Mode,
Quarter 2 – Module 8: NETWORK AND SECURITY
Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the
Government of the Philippines. However, prior approval of the government agency or office
wherein the work is created shall be necessary for exploitation of such work for profit. Such agency
or office may, among other things, impose as a condition the payment of royalties.
Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks,
etc.) included in this module are owned by their respective copyright holders. Every effort has been
exerted to locate and seek permission to use these materials from their respective copyright owners.
The publisher and authors do not represent nor claim ownership over them.
Published by the Department of Education
Development Team of the Module
Author: Giovanni Ryan A. Derequito
Editors: Emmanuel Yap
Grace T. Palahang
Reviewers: Mary Jane R. Cardente, PhD Illustrator/Lay-out
Artist: Giovanni Ryan A. Derequito Management Team:
Chairperson:
Arturo B. Bayocot, PhD, CESO III
Regional Director
Co-Chairpersons:
Victor G. De Gracia Jr., PhD, CESO V
Assistant Regional Director
QUARTER 2
Module 8-Week 8
(NETWORK AND SECURITY)
Introductory Message
For the Facilitator:
Welcome to the Technology and Livelihood Education-Information and
Communications Technology – (Computer System Servicing) Grade 10
Alternative Delivery Mode (ADM) Module on Configuring Computer Systems
and Networks!
This module was collaboratively designed, developed and reviewed by
educators both from public and private institutions to assist you, the teacher
or facilitator in helping the learners meet the standards set by the K to 12
Curriculum while overcoming their personal, social, and economic constraints
in schooling.
This learning resource hopes to engage the learners into guided and
independent learning activities at their own pace and time. Furthermore, this
also aims to help learners acquire the needed 21st century skills while taking
into consideration their needs and circumstances.
In addition to the material in the main text, you will also see this box in
the body of the module:
This module was designed to provide you with fun and meaningful
opportunities for guided and independent learning at your own pace and
time. You will be enabled to process the contents of the learning resource
while being an active learner.
What I Need to Know This will give you an idea of the skills or
competencies you are expected to
learn in the module.
This will define the Network Security and its different types what is
suitable for installations to enable it to the computer system.
The students will learn on how to configure of file and printer sharing as one
of the most effective ways to manage computer settings as a network
administrator. The File and Printer Sharing setting needs to be enabled in
your work-sharing network domain before you can use network printers or
transfer files between computers operating system feature that enables the
computer to communicate to each other and send print jobs to your printer.
All computers should be part of the main network and the same Workgroup
or Homegroup for File and Printer Sharing to work properly. The students will
understand the terms “File Sharing” and “Printer Sharing.”
The students will learn the steps in configuring a file sharing and printer sharing.
This module is designed to teach the students to learn the safety and
precautions by setting activities or guidelines for inspection and testing the
computer systems and networks.
It outlines the potential health risks and provides an implementing
policy statement that is maintaining the required level of health and safety in
the workplace which the students will understand very well the importance
of its procedure:
Multiple Choice
What I Know
A B
1) attached to small pieces
of computer code,
a. accidental threats
software and
documents.
b. antivirus software
2) when an employee
c. data encryption
intends to cause damage
d. firewall
3) it is technical a worm e. malicious threats
4) Software designed to f. traffic
detect, disable and g. trojan horse
remove viruses
5) when user damages data h. virus
or equipment i. VPN
unintentionally
6) data being transported on a j. WPA
network
7) an encryption system k. WEP
that protects data
8) a self-replicating program l. Worm
that is
harmful to network
9) it involves using codes
and ciphers
10) a way of protecting a
computer from intrusion
through the ports
What’s In
What’s New
Computer and network security help keep data and equipment safe
by giving only the appropriate people access. Everyone in an organization
should give high priority to security, because everyone can be affected by
a breach in security.
An attack that intentionally degrades the performance of a
computer or network can also harm an organization’s productivity. Poorly
implemented security measures that allow unauthorized access to
wireless network devices demonstrate that physical connectivity is not
necessary for security breaches by intruders.
What Is It
Security Attacks 7
To successfully protect computers and the network, a technician must
understand both of the following types of threats to computer security
Physical:
Events or attacks that steal, damage, or destroy such---
equipment as
servers, switches, and wiring.
Data:
Events or attacks that remove, corrupt, deny access to, allow
Source:https://www.cisco.com/c/en/us/producs/security/what-is-network-
securoty.html
Source: www.askbobrankin.com
Figure 4. Most Commonly Known Anti-Virus Software
3. Click Turn on Windows Firewall under each network location that you
want to help protect, and then click OK.
If you want the firewall to prevent all programs from
communicating, including programs that you have previously allowed to
communicate through the firewall, select the Block all incoming connections,
including those in the list of allowed programs check box
9
Data Encryption
Encrypting data involves using codes and ciphers. Data encryption
can help prevent attackers from monitoring or recording traffic between
resources and computers. A virtual private network (VPN) is an encryption
system that protects data as though it resides on a private network.
Port Protection
With port protection, the user can control the type of data
sent to a computer by selecting which ports will be open and which will be
secured. Data being transported on a network is called traffic.
How to Enable Firewall for Windows XP?
13
Wireless Security Techniques
Traffic flows through radio waves in wireless networks, so it is easy
for attackers to monitor and attack data without having to connect to a
network physically.
When installing wireless services, you should apply the following
wireless security techniques immediately to prevent unwanted access to the
network:
14
What’s More
15
Access the controller for the firewall by clicking Windows
Firewall at the bottom of the window.
16
Step 2
19
What I Have Learned
Direction: Fill in the blank with the word that make the statement correct.
1. Computer and help keep data and equipment safe by
giving only the appropriate people access.
2. A primary responsibilities include data and network security.
3. Computer are created with malicious intent and sent by
attacker
s
4. A is transferred to another computer through e-mail, file
transfers, and instant messaging.
5. Security plan policies should be constantly updated to reflect the latest
to a network
What I Can Do
Research Firewalls
2. Which hardware firewall would you purchase? List reasons for your choice.
3. Using the Internet, research two different software firewalls.
Based on your research, complete the table below.
Company/Hardware Website Cost Subscription Length Hardware
Name URL Features
(Month/Year/Lifetime)
4. Which software firewall would you purchase? List reasons for your choice.
20
Assessment
A B
1. attached to small pieces of
computer code, software
a. accidental threats
and documents.
b. antivirus software
2. when an employee intends
c. data encryption
to cause damage
d. firewall
3. it is technical a worm e. malicious threats
f. traffic
4. Software designed to g. trojan horse
detect, disable and
remove viruses h. virus
5. when user damages data i. VPN
or equipment
unintentionally j. WPA
6. data being transported on k. WEP
a network
7. an encryption system that l. Worm
protects data
8. a self-replicating
program that is
harmful to network
9. it involves using codes and
ciphers
10. a way of protecting a
computer from
intrusion through
the ports
21
Additional Activities
Advantages Disadvantages
1.
2.
3.
4.
5.
6
B. Modified True or False
3.Threats to security can come from inside and outside the organization.
4.Computer viruses are created and sent by attackers who have malicious
intent.
5.A virus is transferred to another computer through e-mail, file transfer and
instant messaging
C. Acrostic
REFERENCES
Books and Articles and Printed Materials:
7
“System Configuration utility” Retrieved from
http://moderncomputerskillsandtraining.com/?
page_id=2950-
Retrieved from
http://h10025.www1.hp.com/ewfrf/wc/document?
cc=us&lc=en&dlc=en &docname=bph05694-
9
1
0
1
1