Entrance Announcement
MICTE 2080
2080 Magh 07
User:Saugat karki lesson Plan 7: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
Saugat karki (talk | contribs) No edit summary |
||
Line 5: | Line 5: | ||
!Number of Students: 13 | !Number of Students: 13 | ||
|- | |- | ||
|Time:10 Minutes | |'''Time:10 Minutes''' | ||
|Unit:4 | |'''Unit:4''' | ||
|- | |- | ||
|Class:6 | |'''Class:6''' | ||
|School: Gyansudha school | |'''School: Gyansudha school''' | ||
|- | |- | ||
|Topic: | |'''Topic:Importance of security''' | ||
|Period: 7th | |'''Period: 7th''' | ||
|} | |} | ||
== Materials == | == '''''Specific Objective''''' == | ||
By the end of this lesson, students should be able to understand: | |||
* The importance of security in ICT (Information and Communication Technology) and identify basic security measures. | |||
== '''''Teaching Materials''''' == | |||
* Whiteboard and markers or a presentation tool | * Whiteboard and markers or a presentation tool | ||
Line 66: | Line 68: | ||
#* Mention that security is an ongoing process and a shared responsibility. | #* Mention that security is an ongoing process and a shared responsibility. | ||
== Assessment == | == '''''Assessment''''' == | ||
# What is malware? Write 3 examples. | # What is malware? Write 3 examples. | ||
# How to protect sensitive information from cyber threats? | # How to protect sensitive information from cyber threats? | ||
__NOTOC__ | __NOTOC__ |
Revision as of 05:46, 24 January 2024
Subject: Computer Science | Number of Students: 13 |
---|---|
Time:10 Minutes | Unit:4 |
Class:6 | School: Gyansudha school |
Topic:Importance of security | Period: 7th |
Specific Objective
By the end of this lesson, students should be able to understand:
- The importance of security in ICT (Information and Communication Technology) and identify basic security measures.
Teaching Materials
- Whiteboard and markers or a presentation tool
- Visual aids (images or diagrams related to ICT security)
- Handout or slide printouts for students (optional)
Teaching Learning Activity
Introduction (2 minutes):
- Welcome and Engage:
- Greet the students and explain the relevance of learning about security in ICT.
- Share a brief real-world example of a security breach or cyber threat to capture their attention.
- Icebreaker Question:
- Ask a thought-provoking question like, "Why do you think it's important to secure information and technology?"
Main Content (5 minutes):
- Definition of ICT Security (1 minute):
- Define ICT security: The practice of protecting information and technology assets from unauthorized access, use, disclosure, disruption, modification, or destruction.
- Importance of ICT Security (1 minute):
- Discuss the significance of ICT security:
- Protecting sensitive information (personal, financial, business).
- Safeguarding against cyber threats and attacks.
- Ensuring the reliability and availability of ICT systems.
- Discuss the significance of ICT security:
- Common Threats (2 minutes):
- Briefly introduce common ICT security threats:
- Malware (viruses, worms, ransomware).
- Phishing attacks.
- Unauthorized access (hacking).
- Social engineering.
- Briefly introduce common ICT security threats:
- Basic Security Measures (1 minute):
- Present fundamental security measures:
- Strong Passwords: Emphasize the importance of unique and complex passwords.
- Software Updates: Regularly update operating systems and applications.
- Antivirus Software: Install and update antivirus programs.
- Awareness and Training: Educate users about security best practices.
- Present fundamental security measures:
Conclusion (3 minutes):
- Review and Questions (1 minute):
- Summarize key points discussed during the lesson.
- Encourage students to ask questions or share any insights.
- Interactive Activity (1 minute):
- Conduct a brief scenario-based activity or ask students to discuss in pairs the security measures they can take in specific situations.
- Closing Remarks (1 minute):
- Reinforce the importance of ICT security.
- Mention that security is an ongoing process and a shared responsibility.
Assessment
- What is malware? Write 3 examples.
- How to protect sensitive information from cyber threats?