Entrance Announcement
MICTE 2080
2080 Magh 07
Kriti Sapkota School's lesson Plan7: Difference between revisions
Jump to navigation
Jump to search
(nothing) |
No edit summary |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 3: | Line 3: | ||
!Date:2080/10/13 | !Date:2080/10/13 | ||
|- | |- | ||
|'''Class : | |'''Class: 5''' | ||
|- | |- | ||
|'''Period: fifth''' | |'''Period: fifth''' | ||
|- | |- | ||
|'''Students: | |'''Students : 23''' | ||
|- | |- | ||
|'''Subject :Computer Science''' | |'''Subject :Computer Science''' | ||
Line 23: | Line 23: | ||
'''Teaching learning activities:''' Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. | '''Teaching learning activities:''' Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. | ||
Types of cyber security : | |||
* Application security. ... | |||
* Cloud security. ... | |||
* Critical infrastructure security. ... | |||
* Data security. ... | |||
* Endpoint security. ... | |||
* IoT (Internet of Things) security. ... | |||
* Mobile security. ... | |||
* Network security. | |||
'''Evaluation:''' Describe about cloud security . | |||
'''Feedback:''' | |||
__NOTOC__ | |||
[[Category: BICTE]] | |||
[[Category: Lesson Plan]] |
Latest revision as of 02:28, 13 March 2024
Date:2080/10/13 |
---|
Class: 5 |
Period: fifth |
Students : 23 |
Subject :Computer Science |
Leesson : 7 |
Topic : Cyber Security |
Objective : Students will understand the basics of cybersecurity, including the importance of protecting personal information and the principles of online safety.
Teaching Materials :
- Whiteboard and markers
- Projector and screen
Teaching learning activities: Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.
Types of cyber security :
- Application security. ...
- Cloud security. ...
- Critical infrastructure security. ...
- Data security. ...
- Endpoint security. ...
- IoT (Internet of Things) security. ...
- Mobile security. ...
- Network security.
Evaluation: Describe about cloud security .
Feedback: