User:Saugat karki lesson Plan 7: Difference between revisions

From ICTED-WIKI
Jump to navigation Jump to search
No edit summary
 
(One intermediate revision by one other user not shown)
Line 5: Line 5:
!Number of Students: 13
!Number of Students: 13
|-
|-
|Time:10 Minutes
|'''Time:10 Minutes'''
|Unit:4
|'''Unit:4'''
|-
|-
|Class:6
|'''Class:6'''
|School:  Gyansudha school
|'''School:  Gyansudha school'''
|-
|-
|Topic:  
|'''Topic:Importance of security'''
|Period: 7th
|'''Period: 7th'''
|}
|}
</div>
== Specific Objective ==
By the end of this  lesson, students should be able to understand the importance of security in ICT (Information and Communication Technology) and identify basic security measures.


== Materials ==
== '''''Specific Objective''''' ==
By the end of this  lesson, students should be able to understand:
 
* The importance of security in ICT (Information and Communication Technology) and identify basic security measures.
 
== '''''Teaching Materials''''' ==


* Whiteboard and markers or a presentation tool
* Whiteboard and markers or a presentation tool
Line 66: Line 68:
#* Mention that security is an ongoing process and a shared responsibility.
#* Mention that security is an ongoing process and a shared responsibility.


== Assessment ==
== '''''Assessment''''' ==


# What is malware? Write 3 examples.
# What is malware? Write 3 examples.
# How to protect sensitive information  from cyber threats?
# How to protect sensitive information  from cyber threats?
__NOTOC__
[[Category: Lesson Plan]]
__notoc__
[[Category: BICTE]]

Latest revision as of 03:31, 12 March 2024

Subject: Computer Science Number of Students: 13
Time:10 Minutes Unit:4
Class:6 School: Gyansudha school
Topic:Importance of security Period: 7th

Specific Objective

By the end of this lesson, students should be able to understand:

  • The importance of security in ICT (Information and Communication Technology) and identify basic security measures.

Teaching Materials

  • Whiteboard and markers or a presentation tool
  • Visual aids (images or diagrams related to ICT security)
  • Handout or slide printouts for students (optional)

Teaching Learning Activity

Introduction (2 minutes):

  1. Welcome and Engage:
    • Greet the students and explain the relevance of learning about security in ICT.
    • Share a brief real-world example of a security breach or cyber threat to capture their attention.
  2. Icebreaker Question:
    • Ask a thought-provoking question like, "Why do you think it's important to secure information and technology?"

Main Content (5 minutes):

  1. Definition of ICT Security (1 minute):
    • Define ICT security: The practice of protecting information and technology assets from unauthorized access, use, disclosure, disruption, modification, or destruction.
  2. Importance of ICT Security (1 minute):
    • Discuss the significance of ICT security:
      • Protecting sensitive information (personal, financial, business).
      • Safeguarding against cyber threats and attacks.
      • Ensuring the reliability and availability of ICT systems.
  3. Common Threats (2 minutes):
    • Briefly introduce common ICT security threats:
      • Malware (viruses, worms, ransomware).
      • Phishing attacks.
      • Unauthorized access (hacking).
      • Social engineering.
  4. Basic Security Measures (1 minute):
    • Present fundamental security measures:
      • Strong Passwords: Emphasize the importance of unique and complex passwords.
      • Software Updates: Regularly update operating systems and applications.
      • Antivirus Software: Install and update antivirus programs.
      • Awareness and Training: Educate users about security best practices.

Conclusion (3 minutes):

  1. Review and Questions (1 minute):
    • Summarize key points discussed during the lesson.
    • Encourage students to ask questions or share any insights.
  2. Interactive Activity (1 minute):
    • Conduct a brief scenario-based activity or ask students to discuss in pairs the security measures they can take in specific situations.
  3. Closing Remarks (1 minute):
    • Reinforce the importance of ICT security.
    • Mention that security is an ongoing process and a shared responsibility.

Assessment

  1. What is malware? Write 3 examples.
  2. How to protect sensitive information from cyber threats?