Entrance Announcement
MICTE 2080
2080 Magh 07
User:Kriti Sapkota lesson plan 9: Difference between revisions
Jump to navigation
Jump to search
nothing |
No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 7: | Line 7: | ||
|'''TIme: 10mins''' | |'''TIme: 10mins''' | ||
|- | |- | ||
|'''Class: | |'''Class : 6''' | ||
|- | |- | ||
|'''Teaching item : "Computer Security"''' | |'''Teaching item : "Computer Security"''' | ||
Line 33: | Line 33: | ||
'''5. Feedback :''' | '''5. Feedback :''' | ||
__NOTOC__ | |||
[[Category: BICTE]] | |||
[[Category: Lesson Plan]] |
Latest revision as of 02:27, 13 March 2024
Date: 2080/09/06 |
---|
Period: 5th |
TIme: 10mins |
Class : 6 |
Teaching item : "Computer Security" |
Objective : By the end of this lesson student must be able to to about computer security.
Teaching material : Slideshows
Teaching Learning Activities: Define computer security and its features .
The protection of computer systems and information from theft, damage, or unauthorized access.
- Confidentiality: Ensuring that sensitive data is accessible only to authorized individuals and protected from unauthorized access or disclosure.
- Integrity: Guaranteeing the accuracy and reliability of data and resources by preventing unauthorized alteration, modification, or deletion.
- Availability: Ensuring that computer systems, networks, and resources are consistently accessible and operational for authorized users when needed, minimizing downtime and disruptions.
- Authentication: Verifying the identity of users or entities accessing the system, typically through passwords, biometrics, two-factor authentication, etc.
- Authorization: Granting appropriate access rights and permissions to users or entities based on their authenticated identity and roles to ensure they only access the resources they are allowed to use.
- Non-repudiation: Preventing individuals from denying their actions in a transaction or communication, ensuring accountability and traceability of events.
- Resilience: Implementing measures to withstand and recover from security breaches, disasters, or cyber-attacks, minimizing the impact on operations.
- Encryption: Encoding data or communications to make it unreadable to unauthorized users, ensuring confidentiality even if intercepted.
After completing all topics make them notify about next topic which will learn tomorrow . "Computer security " .
4. Evaluation;- Use quick quizes, encourage student to ask question and clarify any doubts, give assignment question to solve .
5. Feedback :