User:Kriti Sapkota lesson plan 9: Difference between revisions

From ICTED-WIKI
Jump to navigation Jump to search
(class)
No edit summary
 
Line 33: Line 33:


'''5. Feedback :'''
'''5. Feedback :'''
__NOTOC__
[[Category: BICTE]]
[[Category: Lesson Plan]]

Latest revision as of 02:27, 13 March 2024

Date: 2080/09/06
Period: 5th
TIme: 10mins
Class : 6
Teaching item : "Computer Security"

Objective : By the end of this lesson student must be able to to about computer security.

Teaching material : Slideshows

Teaching Learning Activities: Define computer security and its features .

The protection of computer systems and information from theft, damage, or unauthorized access.

  1. Confidentiality: Ensuring that sensitive data is accessible only to authorized individuals and protected from unauthorized access or disclosure.
  2. Integrity: Guaranteeing the accuracy and reliability of data and resources by preventing unauthorized alteration, modification, or deletion.
  3. Availability: Ensuring that computer systems, networks, and resources are consistently accessible and operational for authorized users when needed, minimizing downtime and disruptions.
  4. Authentication: Verifying the identity of users or entities accessing the system, typically through passwords, biometrics, two-factor authentication, etc.
  5. Authorization: Granting appropriate access rights and permissions to users or entities based on their authenticated identity and roles to ensure they only access the resources they are allowed to use.
  6. Non-repudiation: Preventing individuals from denying their actions in a transaction or communication, ensuring accountability and traceability of events.
  7. Resilience: Implementing measures to withstand and recover from security breaches, disasters, or cyber-attacks, minimizing the impact on operations.
  8. Encryption: Encoding data or communications to make it unreadable to unauthorized users, ensuring confidentiality even if intercepted.

After completing all topics make them notify about next topic which will learn tomorrow . "Computer security " .

4. Evaluation;- Use quick quizes, encourage student to ask question and clarify any doubts, give assignment question to solve .

5. Feedback :