troubleshooting

Q3 Safeguarding Your Devices Step 2

8. Troubleshooting

AntiVirus protection

Step 1. If you have a computing device (smartphone, tablet, computer) at home, check to see if it has up-to-date, active antivirus software installed, like Windows Defender. If you don't have a computer at home, check with a relative or friend. You DO NOT need to install the software at this time.

Step 2. Do some research and learn about some popular antivirus software products for purchase, then research some free ones:

The Best Free Antivirus Software for 2025- or - MacWorld Best AntiVirus for the Mac

Free is Good: An antivirus program is essential to protect your computer. There are several good options out there. The key is to make sure you have one installed that's up-to-date. When you open your antivirus app, it should tell you if your virus definitions are current. If it says you're not protected, your parent or guardian may want to update the software or switch to a different program. 

Step 3. Copy or download this: 8.Q3 Antivirus Research Organizer. 

Step 4. As you do research for your class, you can check out reviews for the top antivirus software choices and pricing options. Make some recommendations to your parents or guardian based on the research results. The final decision on what to install is up to your parent or guardian. Your part is gathering info to share with them. You shouldn't download or pay for anything yourself without asking. 

Step 5. Research first, then make suggestions. Your parents can choose the best antivirus program to protect your computer from viruses and malware.

The next activity is optional. PBS has a Cybersecurity Game. You will need to log in to save your progress. 

To play the game, click on the green expandable box below. 

Check with your teacher about when to play this, as homework or in class.

TIME: This game takes about 75 minutes to complete.

GAME: The Cybersecurity Lab by PBS Learning Media

ABOUT: The Cybersecurity Lab is a game designed to teach people how to:

  1. Keep their digital lives safe.
  2. Spot cyber scams.
  3. Learn the basics of coding.
  4. Defend against cyber attacks.

ROLES: Players assume the role of the chief technology officer of a start-up social network company that is the target of increasingly sophisticated cyber attacks.

PLAY: In the game, players must complete challenges to strengthen their cyber defenses and thwart their attackers.

REAL-WORLD SECURITY: The Lab features stories of real-world cyber attacks, a glossary of cyber terms, and short animated videos that explain the need for cybersecurity, privacy versus security, cryptography (cyber codes), and what exactly hackers are.

COMPONENTS: There are four major gameplay components of the Lab:

  1. Coding Challenge: An introduction to basic coding skills. Players program a robot to navigate a maze using drag-and-drop commands. 
  2. Password-Cracking Challenge: A series of “password duels” teaches players the basics of how attackers might try to crack their passwords and how they can make better, more secure passwords.
  3. Social Engineering Challenge: Players are presented with two similar emails or websites. They must first identify the differences between them and then decide which one is a scam attempting to steal their information or money. This challenge also includes several audio recordings and phone call transcripts; players must determine if they should trust the caller. 
  4. Network Attacks: As their companies grow, players must buy defenses to defend themselves against cyber attacks. The better players do in the three challenges, the more resources they’ll have to buy defenses.

LOGIN REQUIREMENTS: You must have or create a login. You can use an account from Facebook, Google, or PBS (free), or you can use the Guest Pass (no progress is saved).

Watch the Introduction Video

BEGIN: Cybersecurity Lab Game

MITECS Michigan Integrated Technology Competencies for Students, and

ISTE Standards for Students

1. Empowered Learner
a. Articulate and set personal learning goals, developing strategies leveraging technology to achieve them, and reflect on the learning process itself to improve learning outcomes
c. Use technology to seek feedback that informs and improves their practice and to demonstrate their learning in a variety of ways
d. Understand the fundamental concepts of technology operations, demonstrate the ability to choose, use and troubleshoot current technologies, are able to transfer their knowledge to explore emerging technologies

3. Knowledge Constructor
d. Build knowledge by actively exploring real-world issues and problems, developing ideas and theories and pursuing answers and solutions

5. Computational Thinker
c. Break problems into component parts, extract key information, and develop descriptive models to understand complex systems or facilitate problem-solving
d. Understand how automation works and use algorithmic thinking to develop a sequence of steps to create and test automated solutions