Managing a Malware Attack

Introduce learners to best practices for successfully managing and navigating a malware attack

About This Module

This curriculum module is based on takeaways from series four of NYC Digital Safety training videos. You may use this module by:

  • Including it in your pre-existing public workshops
  • Combining it with other NYC Digital Safety modules to make a longer data-privacy focused workshop
  • Sharing the handout with library users at various service points

Downloadable presentation slides, a facilitation guide, and a handout can be found below.

Learning Outcomes

By the end of this module, learners will be able to:

  • Identify different kinds of malware
  • Describe the ways in which malware attacks work
  • Identify approaches for managing a malware attack

Lesson Plan

This lesson plan is also included in the downloadable facilitation guide below. You are welcome to use any and all of this, or adapt it as you see fit.

This module will take approximately 45 minutes to complete.

Introduction and welcome

Greet learners and share the plan for this module

Defining malware

Review this definition of malware and note that some forms of malware are more aggressive than others

Discussion: Malware examples and effects

Ask your learners what malware can do and see what examples or ideas they have to share.
Consider getting discussion going by sharing a personal or real-world example of a malware attack

More aggressive types of malware

Review the examples and types listed on these slides and pause to see if anyone has any other examples to share or experiences with any of the things listed

The signs of a malware infection

Review the different signs of malware listed here and pause to see if anyone has experienced any of these things before during a malware attack. If you have a personal example that you feel comfortable sharing, feel free to include it here

What to do during and after a malware attack

Review the list of strategies here and see if anyone has any questions or needs any clarification about the steps listed

Wrap up, final tips, and final questions

Review the final suggestions and introduce the resources listed. If you have extra time, consider giving your learners longer to explore the links listed in the resources. See if there are any final questions

Next Steps

Download the materials below for use in your workshop or at service points throughout your library.

If you plan to create a longer privacy-focused workshop using these materials, here is a link to Google slides. Feel free to make a copy if you’d like to add these slides to any other deck.

And please let us know how it went! Use this form to share your feedback on this module. We’d love to hear from you.