Entrance Announcement
MICTE 2080
2080 Magh 07
User:Keshab Lesson Plan 1: Difference between revisions
(One intermediate revision by one other user not shown) | |||
Line 11: | Line 11: | ||
#basic cybersecurity practice. | #basic cybersecurity practice. | ||
== Teaching aids == | |||
==Teaching aids== | |||
* White board and Markers | * White board and Markers | ||
* Computer and Internet. | * Computer and Internet. | ||
== '''Introduction (3 minutes)''' == | |||
Define cybercrime and its forms. | Define cybercrime and its forms. | ||
Discuss the importance of cybersecurity. | Discuss the importance of cybersecurity. | ||
== '''Types of cyber crime(3 minutes)''' == | |||
Explain Phishing malware and hacking. | Explain Phishing malware and hacking. | ||
== '''Cybersecurity Basics (5 Minutes)''' == | |||
Emphasize the importance of strong password and multi factor authentication | Emphasize the importance of strong password and multi factor authentication | ||
Line 33: | Line 31: | ||
Educate about safe browsing and recognize the potential risk. | Educate about safe browsing and recognize the potential risk. | ||
== '''Case study (2 minutes)''' == | |||
Examine Real life cyber crime cases and foster discussion on how these incidents could have been avoided with proper cybersecurity measures. | Examine Real life cyber crime cases and foster discussion on how these incidents could have been avoided with proper cybersecurity measures. | ||
== '''Cybersecurity tools (2 Minutes)''' == | |||
Explore Antivirus software firewall | Explore Antivirus software firewall | ||
Encourage students to understand the purpose and functionality of these tools in protecting digital assets. | Encourage students to understand the purpose and functionality of these tools in protecting digital assets. | ||
== '''Group activity(3 Minutes)''' == | |||
Assign Scenarios related to cybersecurity issues for analysis | Assign Scenarios related to cybersecurity issues for analysis | ||
Encourage collaborative problem solving and propose preventive measure | Encourage collaborative problem solving and propose preventive measure | ||
== '''Discussion and Q&A( 2 Minutes)''' == | |||
Conduct a comprehensive class discussion on group activities | Conduct a comprehensive class discussion on group activities | ||
Address any questions or concerns regarding cybercrime or cybersecurity. | Address any questions or concerns regarding cybercrime or cybersecurity. | ||
== '''Assignments''' == | |||
Assign a research task on emerging cybersecurity threats or innovative technologies in the field. | Assign a research task on emerging cybersecurity threats or innovative technologies in the field. | ||
__NOTOC__ | |||
[[Category: BICTE]] | |||
[[Category: Lesson Plan]] | [[Category: Lesson Plan]] |
Latest revision as of 03:04, 12 March 2024
Subject Computer Science Time: 20 Minutes
Topic :Cyber crime and its security. Total no of students: 20
Class: VIII
Specific objectives
- To learn the concept of cyber crime,
- its impact and
- basic cybersecurity practice.
Teaching aids
- White board and Markers
- Computer and Internet.
Introduction (3 minutes)
Define cybercrime and its forms.
Discuss the importance of cybersecurity.
Types of cyber crime(3 minutes)
Explain Phishing malware and hacking.
Cybersecurity Basics (5 Minutes)
Emphasize the importance of strong password and multi factor authentication
Advocate for regular software updates
Educate about safe browsing and recognize the potential risk.
Case study (2 minutes)
Examine Real life cyber crime cases and foster discussion on how these incidents could have been avoided with proper cybersecurity measures.
Cybersecurity tools (2 Minutes)
Explore Antivirus software firewall
Encourage students to understand the purpose and functionality of these tools in protecting digital assets.
Group activity(3 Minutes)
Assign Scenarios related to cybersecurity issues for analysis
Encourage collaborative problem solving and propose preventive measure
Discussion and Q&A( 2 Minutes)
Conduct a comprehensive class discussion on group activities
Address any questions or concerns regarding cybercrime or cybersecurity.
Assignments
Assign a research task on emerging cybersecurity threats or innovative technologies in the field.