0
0
Intro to Computingfundamentals~10 mins

Common threats (malware, phishing, ransomware) in Intro to Computing - Draw & Build Visually

Choose your learning style9 modes available
Draw This - beginner

Draw a diagram showing the three common computer security threats: malware, phishing, and ransomware. For each threat, include a simple icon or symbol and a short description of how it affects a computer or user.

10 minutes
Hint 1
Hint 2
Hint 3
Grading Criteria
Three threats labeled correctly: malware, phishing, ransomware
Each threat has a simple icon or symbol
Each threat has a short, clear description of its effect
Arrows or lines connect threats to their descriptions
Diagram is neat and easy to understand
Solution
  +----------------+       +----------------+       +----------------+
  |    Malware     |       |   Phishing     |       |  Ransomware    |
  |  (Virus Icon)  |       | (Hook Icon)    |       | (Lock Icon)    |
  +-------+--------+       +--------+-------+       +--------+-------+
          |                         |                        |
          | Infects computer        | Tricks user to         | Locks files and
          | with harmful software   | reveal personal info   | demands payment
          | like a virus in body    | like a fake email      | like a kidnapper
          |                        |                        |
          v                         v                        v
  [Computer slows down]    [User gives password]    [Files become inaccessible]

This diagram shows three common computer threats:

  • Malware: Represented by a virus icon, it infects the computer like a virus infects a body, causing it to slow down or malfunction.
  • Phishing: Shown with a hook icon, it tricks users into giving personal information by pretending to be trustworthy, like a fake letter asking for secrets.
  • Ransomware: Illustrated with a lock icon, it locks the user's files and demands payment to unlock them, similar to a kidnapper holding something hostage.

Arrows connect each threat to its effect, helping visualize how each threat impacts the user or computer.

Variations - 2 Challenges
[intermediate] Draw a flowchart showing how a phishing attack can lead to a ransomware infection. Include steps from receiving a phishing email to files being locked by ransomware.
[advanced] Draw a detailed diagram showing four types of malware: virus, worm, Trojan horse, and spyware. Include how each spreads or affects the computer.