1_1_Information Security_Lesson_plan_2_variant

  • docx
  • 01.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала 1_1_Information Security_Lesson_plan_2_variant.docx

                                        Short Term Plan

Long-term plan unit:

10.1A Computer Systems and Information Security

School:

Date:

Teacher name:

Grade:

Number present:

absent:

The topic of the lesson:

 

Information Security

Learning objectives(s) that this lesson is contributing to

10.6.2.1 explain the meaning of information security, confidentiality, integrity and accessibility

Lesson objectives

All students will be able to explain the concepts.
               • Information Security
               • Confidentiality
               • Integrity
               • Availability
Most students will be able to
               • Answer questions for posting

Some students will be able to provide support to their classmates.

Success criteria

Explains the term "Information Security"

Explains the term “Privacy”

Explains the term "Integrity"

Explains the term “accessibility”

Language objectives

 

Students can:

explain the terms as “information security”, “confidentiality”, “integrity” and “accessibility”.

Language learning objective

Students can:

explain the terms as “information security”, “confidentiality”, “integrity” and “accessibility”.

Subject vocabulary and terminology:

information security, confidentiality, integrity and availability.

A series of useful phrases for dialogue / writing:

Confidentiality ..., while security ...

Value links

Soft skills

Respect for each other when working in groups

 

Cross curricular links

English

Previous learning

Different sources of information.

Plan

Planned lesson stages

Planned activities

Resources

Beginning

 

0-3

 

 

 

 

 

3-10

mins

Create a word cloud on the poster to the term "Information Security"

Issues for students:

1. Why is information security so important?

2. What solutions exist to ensure information security?

3. How real is the FULL information protection?

 

Define information security and introduce for the lesson.

 

Information security is a state of security of the information environment (personal, business, society, state).

Information protection activities are aimed at preventing leakage of protected information, unauthorized and unintended effects on information that is to be protected.

 

http://wordscloud.pythonanywhere.com/

 

 

 

 

 

 

 

 

 

 

Marker board

Middle

Group work

10-15 min

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Group work

15-25 min

 

 

 

 

 

 

25-35

min

 

 

 

 

 

 

Activity 1

Students should be divided into 3 groups. In each group, students independently study the material.

 

Each group is given a topic.

1. Confidentiality

2. Data integrity

3. Availability

 

Group A - Security

Group B - Privacy

Group C - Integrity of data

Definition

 

 

 

Examples

 

 

 

Why do we need it?

 

 

 

Assignment: Students must create a poster that details their topic according to the criteria.

 

The teacher explains the concepts of validation and verification.

Activity 2

Each group presents information (explain the meaning of the terms “confidentiality”, “integrity” and “accessibility”), other groups listen to the material and cross-refer to the criteria for mutual learning.

 

 

Activity 3 Questions to fix

 

1. Describe two differences between data integrity and data security.

2. Data integrity is used during the input phase as well as during data transfer. Specify two ways to ensure data integrity during the input phase. Use examples to explain your answer.

Mutual appreciation in pairs

 

 

 

 

 

 

 

Poster

 

Didactic materials

1,2,3

 

 

 

 

 

 

 

 

 

Presentation

 

 

 

 

 

 

 

 

 

 

 

The end of the lesson

35 - 40

 

 

 

 

 

 

 

Reflection on the wall Padlet.com

1. What are 2 tasks that you easily coped with in class?

2. Name the task that caused the difficulties.

3. Do you think you have reached the goal of learning today?

PPT Slide (8)

Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners?

Assessment – how are you planning to check learners’ learning?

Health and safety check
ICT links

Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time.

Use this section to record the methods that you will use to assess what the students have learned during the lesson.

 

Health and safety check links.

Used active exercises.

Items applied from the Safety Rules in this lesson.

Reflection

 

Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO?

If not, why?

Did my planned differentiation work well?

Did I stick to timings?

What changes did I make from my plan and why?

 

Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. 

 

 

 

 

 

 

 

 

 

Summary evaluation

 

 

What two things went really well (consider both teaching and learning)?

 

1:

 

2:

 

What two things would have improved the lesson (consider both teaching and learning)?

 

1:

 

2:

 

What have I learned from

 

this lesson about the class or individuals that will inform my next lesson?

 

 

 

 

 

 


 

Скачано с www.znanio.ru

Посмотрите также