Lesson 6: Security Basics: Protecting Systems, Data, and Users

ITF+ • LESSON 6

Security Basics

This lesson teaches the security habits that keep real people safe: malware and phishing, strong authentication, updates, and backups. Security is mostly behavior — not magic tools.

Beginner-friendly Hands-on practical Quiz + explanations CompTIA-aligned

Security map (how attacks really work)

Most attacks follow a simple pattern: a threat enters through an entry point, causes an impact, and is reduced by defenses (habits + tools).

Threat Entry Point Impact Malware virus • ransomware • spyware Phishing fake emails • urgency • links Weak habits reuse passwords • no updates Email link / attachment Infected download Unpatched software Stolen logins / identity Encrypted files (ransom) System slowdown / damage
Diagram: Threat → entry point → impact. Your defenses are habits: verify links, update, MFA, and backups.

Malware vs phishing (easy definitions)

Malware is harmful software (virus, ransomware, spyware). It damages systems or steals data.

Phishing tricks the user into giving access (passwords, codes) or clicking dangerous links.

Malware

Virus

Attaches to files/programs and spreads when run.

Clue: “I opened a file and now things are weird.”

Malware

Ransomware

Encrypts files and demands payment.

Defense: offline or separate backups.

Phishing

Social engineering

Fake messages that create urgency: “act now.”

Defense: verify sender, don’t click, use MFA.

Quick test: If it’s trying to trick you, it’s probably phishing. If it’s software harming the system, it’s malware.

Security habits that matter most

Authentication

Passwords + MFA

Long + unique passwords are safer than “complex but reused.”

MFA blocks many stolen-password attacks.

Patching

Updates

Updates fix security holes attackers already know about.

Rule: unpatched = unlocked door.

Recovery

Backups

Backups let you recover from ransomware, deletion, or drive failure.

Rule: one copy = no safety.

Practical: Classify the scenario (Malware / Phishing / Safe)

Click a scenario, then click the correct category. This trains the reflex: “What kind of problem is this?”

Security Classification Drill

Goal: sort 12 scenarios correctly. This is the foundation of real troubleshooting.
0/12 correct

Malware = harmful software.  |  Phishing = trick message stealing access.  |  Safe = normal or recommended behavior.

Malware “Bad software”

Phishing “Trick message”

Safe “Good behavior”

Scenarios (click one)

Tip: If it’s pressure + link + “act now”, it’s usually phishing. If it’s software changing files / slowing the PC, it’s often malware. If it’s updates, MFA, backups, that’s safe.
Progress: Get 10–12 correct to be quiz-ready.

Lesson 6 Quiz: Security Basics

Answer each question, then click Grade Quiz. Aim for 75%+ to unlock the next lesson.

Knowledge Check

Short, direct questions that build a usable security mindset: recognize threats, reduce risk, recover fast.

1) What does “security” mean in IT?

Security is about reducing risk and protecting systems, data, and people.

2) Which is an example of malware?

Ransomware is malicious software that encrypts files and demands payment.

3) What is phishing?

Phishing targets the user with deception (fake urgency, fake links, fake logins).

4) Which is a common sign of phishing?

Phishing often uses urgency and a link to push quick, unthinking action.

5) Why are software updates important for security?

Patches fix security holes; attackers often target unpatched systems.

6) What is MFA (multi-factor authentication)?

MFA combines factors like password + phone code/approval.

7) Which password practice is best?

Unique passwords prevent one breach from spreading to multiple accounts.

8) A user plugs in a USB drive from an unknown source. What’s the best security mindset?

Unknown downloads/USB media are common malware entry points.

9) What is the main benefit of backups?

Backups are the recovery plan when things go wrong.

10) Which statement is most accurate?

Defense-in-depth is the reality: you reduce risk with multiple layers.

Next Lesson

Score 75%+ to unlock the next lesson button. (Progress is saved locally on this device only.)

Locked Target: 75%
Go to Lesson 7 →

Leave a Comment