Introduce learners to best practices for successfully managing and navigating a malware attack
About This Module
This curriculum module is based on takeaways from series four of NYC Digital Safety training videos. You may use this module by:
- Including it in your pre-existing public workshops
- Combining it with other NYC Digital Safety modules to make a longer data-privacy focused workshop
- Sharing the handout with library users at various service points
Downloadable presentation slides, a facilitation guide, and a handout can be found below.
Learning Outcomes
By the end of this module, learners will be able to:
- Identify different kinds of malware
- Describe the ways in which malware attacks work
- Identify approaches for managing a malware attack
Lesson Plan
This lesson plan is also included in the downloadable facilitation guide below. You are welcome to use any and all of this, or adapt it as you see fit.
This module will take approximately 45 minutes to complete.
Introduction and welcome
Greet learners and share the plan for this module
Defining malware
Review this definition of malware and note that some forms of malware are more aggressive than others
Discussion: Malware examples and effects
Ask your learners what malware can do and see what examples or ideas they have to share.
Consider getting discussion going by sharing a personal or real-world example of a malware attack
More aggressive types of malware
Review the examples and types listed on these slides and pause to see if anyone has any other examples to share or experiences with any of the things listed
The signs of a malware infection
Review the different signs of malware listed here and pause to see if anyone has experienced any of these things before during a malware attack. If you have a personal example that you feel comfortable sharing, feel free to include it here
What to do during and after a malware attack
Review the list of strategies here and see if anyone has any questions or needs any clarification about the steps listed
Wrap up, final tips, and final questions
Review the final suggestions and introduce the resources listed. If you have extra time, consider giving your learners longer to explore the links listed in the resources. See if there are any final questions
Next Steps
Download the materials below for use in your workshop or at service points throughout your library.
If you plan to create a longer privacy-focused workshop using these materials, here is a link to Google slides. Feel free to make a copy if you’d like to add these slides to any other deck.
And please let us know how it went! Use this form to share your feedback on this module. We’d love to hear from you.