Micro Teaching Lesson Plan 6

From ICTED-WIKI
Revision as of 10:55, 21 May 2024 by SusmitaPandey (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Class: 11 ________________________________ Subject: Computer Science

Period: 2nd ________________________________ Chapter: 8

Duration of Period: 50 min ________________________________ No of Student: 12

Lesson Plan: Introduction to Hacking and its Categories

Objective:

       - understand the concept of hacking and its different categories

Materials Needed:

      - Whiteboard and markers
      - Projector and screen
      - Internet access for research

Procedure:

1. Introduction (10 minutes):

   Begin the class by asking students if they have heard of the term "hacking" and what they think it means.
   Write down their responses on the board and discuss them briefly.
   Explain that hacking involves gaining unauthorized access to computer systems or networks.

2. Definition and Explanation of Hacking (10 minutes):

  - Present a formal definition of hacking and explain it in simple terms.
  - Discuss the motivations behind hacking, including curiosity, activism, criminal intent, and ethical hacking for security purposes.
  - Emphasize the importance of understanding hacking for defensive (security) and offensive (ethical hacking) purposes.

3. Categories of Hacking (15 minutes):

  - Introduce the different categories of hacking:
  - White Hat Hacking (Ethical Hacking)
  - Black Hat Hacking (Malicious Hacking)
  - Grey Hat Hacking
   Provide examples and real-world scenarios for each category to help students grasp the concepts better.


4. Discussion and Reflection (10 minutes):

  - Facilitate a class discussion on the ethical dilemmas surrounding hacking.
  - Encourage students to reflect on their own values and beliefs regarding hacking.
  - Ask students:    
  1. What is the primary goal of ethical hacking?
    • a) To gain unauthorized access to computer systems
    • b) To exploit vulnerabilities for personal gain
    • c) To identify security weaknesses and improve defenses
    • d) To steal sensitive information Answer: c) To identify security weaknesses and improve defenses
  2. Which of the following is NOT a phase of ethical hacking?
    • a) Footprinting
    • b) Exploitation
    • c) Reporting
    • d) Covering tracks Answer: b) Exploitation
  3. What is the purpose of penetration testing in ethical hacking?
    • a) To develop new hacking techniques
    • b) To attack computer systems without permission
    • c) To simulate real-world attacks to identify vulnerabilities
    • d) To steal confidential data Answer: c) To simulate real-world attacks to identify vulnerabilities
  4. Which of the following is a common method used in social engineering attacks?
    • a) SQL injection
    • b) Buffer overflow
    • c) Phishing
    • d) Cross-site scripting (XSS) Answer: c) Phishing

5. Conclusion (5 minutes):

  - Summarize the key points covered in the lesson.