Entrance Announcement
MICTE 2080
2080 Magh 07
User:Kriti Sapkota lesson plan 9: Difference between revisions
Jump to navigation
Jump to search
(class) |
No edit summary |
||
Line 33: | Line 33: | ||
'''5. Feedback :''' | '''5. Feedback :''' | ||
__NOTOC__ | |||
[[Category: BICTE]] | |||
[[Category: Lesson Plan]] |
Latest revision as of 02:27, 13 March 2024
Date: 2080/09/06 |
---|
Period: 5th |
TIme: 10mins |
Class : 6 |
Teaching item : "Computer Security" |
Objective : By the end of this lesson student must be able to to about computer security.
Teaching material : Slideshows
Teaching Learning Activities: Define computer security and its features .
The protection of computer systems and information from theft, damage, or unauthorized access.
- Confidentiality: Ensuring that sensitive data is accessible only to authorized individuals and protected from unauthorized access or disclosure.
- Integrity: Guaranteeing the accuracy and reliability of data and resources by preventing unauthorized alteration, modification, or deletion.
- Availability: Ensuring that computer systems, networks, and resources are consistently accessible and operational for authorized users when needed, minimizing downtime and disruptions.
- Authentication: Verifying the identity of users or entities accessing the system, typically through passwords, biometrics, two-factor authentication, etc.
- Authorization: Granting appropriate access rights and permissions to users or entities based on their authenticated identity and roles to ensure they only access the resources they are allowed to use.
- Non-repudiation: Preventing individuals from denying their actions in a transaction or communication, ensuring accountability and traceability of events.
- Resilience: Implementing measures to withstand and recover from security breaches, disasters, or cyber-attacks, minimizing the impact on operations.
- Encryption: Encoding data or communications to make it unreadable to unauthorized users, ensuring confidentiality even if intercepted.
After completing all topics make them notify about next topic which will learn tomorrow . "Computer security " .
4. Evaluation;- Use quick quizes, encourage student to ask question and clarify any doubts, give assignment question to solve .
5. Feedback :