Entrance Announcement
MICTE 2080
2080 Magh 07
User:Saugat karki lesson Plan 7: Difference between revisions
Jump to navigation
Jump to search
Saugat karki (talk | contribs) mNo edit summary |
m (→Assessment) |
||
(3 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{| class="wikitable" | |||
|+ | |||
!Subject: Computer Science | |||
!Number of Students: 13 | |||
|- | |||
|'''Time:10 Minutes''' | |||
|'''Unit:4''' | |||
|- | |||
|'''Class:6''' | |||
|'''School: Gyansudha school''' | |||
|- | |||
|'''Topic:Importance of security''' | |||
|'''Period: 7th''' | |||
|} | |||
== Specific Objective == | == '''''Specific Objective''''' == | ||
By the end of this lesson, students should be able to understand | By the end of this lesson, students should be able to understand: | ||
== Materials == | * The importance of security in ICT (Information and Communication Technology) and identify basic security measures. | ||
== '''''Teaching Materials''''' == | |||
* Whiteboard and markers or a presentation tool | * Whiteboard and markers or a presentation tool | ||
Line 53: | Line 68: | ||
#* Mention that security is an ongoing process and a shared responsibility. | #* Mention that security is an ongoing process and a shared responsibility. | ||
== Assessment == | == '''''Assessment''''' == | ||
# What is malware? Write 3 examples. | # What is malware? Write 3 examples. | ||
# How to protect sensitive information from cyber threats? | # How to protect sensitive information from cyber threats? | ||
[[Category: Lesson Plan]] | |||
__notoc__ | |||
[[Category: BICTE]] |
Latest revision as of 03:31, 12 March 2024
Subject: Computer Science | Number of Students: 13 |
---|---|
Time:10 Minutes | Unit:4 |
Class:6 | School: Gyansudha school |
Topic:Importance of security | Period: 7th |
Specific Objective
By the end of this lesson, students should be able to understand:
- The importance of security in ICT (Information and Communication Technology) and identify basic security measures.
Teaching Materials
- Whiteboard and markers or a presentation tool
- Visual aids (images or diagrams related to ICT security)
- Handout or slide printouts for students (optional)
Teaching Learning Activity
Introduction (2 minutes):
- Welcome and Engage:
- Greet the students and explain the relevance of learning about security in ICT.
- Share a brief real-world example of a security breach or cyber threat to capture their attention.
- Icebreaker Question:
- Ask a thought-provoking question like, "Why do you think it's important to secure information and technology?"
Main Content (5 minutes):
- Definition of ICT Security (1 minute):
- Define ICT security: The practice of protecting information and technology assets from unauthorized access, use, disclosure, disruption, modification, or destruction.
- Importance of ICT Security (1 minute):
- Discuss the significance of ICT security:
- Protecting sensitive information (personal, financial, business).
- Safeguarding against cyber threats and attacks.
- Ensuring the reliability and availability of ICT systems.
- Discuss the significance of ICT security:
- Common Threats (2 minutes):
- Briefly introduce common ICT security threats:
- Malware (viruses, worms, ransomware).
- Phishing attacks.
- Unauthorized access (hacking).
- Social engineering.
- Briefly introduce common ICT security threats:
- Basic Security Measures (1 minute):
- Present fundamental security measures:
- Strong Passwords: Emphasize the importance of unique and complex passwords.
- Software Updates: Regularly update operating systems and applications.
- Antivirus Software: Install and update antivirus programs.
- Awareness and Training: Educate users about security best practices.
- Present fundamental security measures:
Conclusion (3 minutes):
- Review and Questions (1 minute):
- Summarize key points discussed during the lesson.
- Encourage students to ask questions or share any insights.
- Interactive Activity (1 minute):
- Conduct a brief scenario-based activity or ask students to discuss in pairs the security measures they can take in specific situations.
- Closing Remarks (1 minute):
- Reinforce the importance of ICT security.
- Mention that security is an ongoing process and a shared responsibility.
Assessment
- What is malware? Write 3 examples.
- How to protect sensitive information from cyber threats?