Security Basics
This lesson teaches the security habits that keep real people safe: malware and phishing, strong authentication, updates, and backups. Security is mostly behavior — not magic tools.
Security map (how attacks really work)
Most attacks follow a simple pattern: a threat enters through an entry point, causes an impact, and is reduced by defenses (habits + tools).
Malware vs phishing (easy definitions)
Malware is harmful software (virus, ransomware, spyware). It damages systems or steals data.
Phishing tricks the user into giving access (passwords, codes) or clicking dangerous links.
Virus
Attaches to files/programs and spreads when run.
Clue: “I opened a file and now things are weird.”
Ransomware
Encrypts files and demands payment.
Defense: offline or separate backups.
Social engineering
Fake messages that create urgency: “act now.”
Defense: verify sender, don’t click, use MFA.
Security habits that matter most
Passwords + MFA
Long + unique passwords are safer than “complex but reused.”
MFA blocks many stolen-password attacks.
Updates
Updates fix security holes attackers already know about.
Rule: unpatched = unlocked door.
Backups
Backups let you recover from ransomware, deletion, or drive failure.
Rule: one copy = no safety.
Practical: Classify the scenario (Malware / Phishing / Safe)
Click a scenario, then click the correct category. This trains the reflex: “What kind of problem is this?”
Security Classification Drill
Goal: sort 12 scenarios correctly. This is the foundation of real troubleshooting.Malware = harmful software. | Phishing = trick message stealing access. | Safe = normal or recommended behavior.
Malware “Bad software”
Phishing “Trick message”
Safe “Good behavior”
Scenarios (click one)
Lesson 6 Quiz: Security Basics
Answer each question, then click Grade Quiz. Aim for 75%+ to unlock the next lesson.
Knowledge Check
Short, direct questions that build a usable security mindset: recognize threats, reduce risk, recover fast.
1) What does “security” mean in IT?
2) Which is an example of malware?
3) What is phishing?
4) Which is a common sign of phishing?
5) Why are software updates important for security?
6) What is MFA (multi-factor authentication)?
7) Which password practice is best?
8) A user plugs in a USB drive from an unknown source. What’s the best security mindset?
9) What is the main benefit of backups?
10) Which statement is most accurate?
Next Lesson
Score 75%+ to unlock the next lesson button. (Progress is saved locally on this device only.)