|
Long-term plan unit: 10.1A Computer Systems and Information Security |
School: |
||||||||||||||||||||
|
Date: |
Teacher name: |
||||||||||||||||||||
|
Grade: |
Number present: |
absent: |
|||||||||||||||||||
|
The topic of the lesson:
|
Information Security |
||||||||||||||||||||
|
Learning objectives(s) that this lesson is contributing to |
10.6.2.1 explain the meaning of information security, confidentiality, integrity and accessibility |
||||||||||||||||||||
|
Lesson objectives |
All students will be able to explain the concepts. • Information Security • Confidentiality • Integrity • AvailabilityMost students will be able to • Answer questions for posting
Some students will be able to provide support to their classmates. |
||||||||||||||||||||
|
Success criteria |
Explains the term "Information Security" Explains the term “Privacy” Explains the term "Integrity" Explains the term “accessibility” |
||||||||||||||||||||
|
Language objectives
|
Students can: explain the terms as “information security”, “confidentiality”, “integrity” and “accessibility”. Language learning objective Students can: explain the terms as “information security”, “confidentiality”, “integrity” and “accessibility”. Subject vocabulary and terminology: information security, confidentiality, integrity and availability. A series of useful phrases for dialogue / writing: Confidentiality ..., while security ... |
||||||||||||||||||||
|
Value links |
Soft skills Respect for each other when working in groups
|
||||||||||||||||||||
|
Cross curricular links |
English |
||||||||||||||||||||
|
Previous learning |
Different sources of information. |
||||||||||||||||||||
|
Plan |
|||||||||||||||||||||
|
Planned lesson stages |
Planned activities |
Resources |
|||||||||||||||||||
|
Beginning
0-3
3-10 mins |
Create a word cloud on the poster to the term "Information Security"
Issues for students: 1. Why is information security so important? 2. What solutions exist to ensure information security? 3. How real is the FULL information protection?
Define information security and introduce for the lesson.
Information security is a state of security of the information environment (personal, business, society, state). Information protection activities are aimed at preventing leakage of protected information, unauthorized and unintended effects on information that is to be protected. |
http://wordscloud.pythonanywhere.com/
Marker board |
|||||||||||||||||||
|
Middle Group work 10-15 min
Group work 15-25 min
25-35 min
|
Activity 1 Students should be divided into 3 groups. In each group, students independently study the material.
Each group is given a topic. 1. Confidentiality 2. Data integrity 3. Availability
Assignment: Students must create a poster that details their topic according to the criteria.
The teacher explains the concepts of validation and verification. Activity 2 Each group presents information (explain the meaning of the terms “confidentiality”, “integrity” and “accessibility”), other groups listen to the material and cross-refer to the criteria for mutual learning.
Activity 3 Questions to fix
1. Describe two differences between data integrity and data security. 2. Data integrity is used during the input phase as well as during data transfer. Specify two ways to ensure data integrity during the input phase. Use examples to explain your answer. Mutual appreciation in pairs
|
Poster
Didactic materials 1,2,3
Presentation
|
|||||||||||||||||||
|
The end of the lesson 35 - 40
|
Reflection on the wall Padlet.com 1. What are 2 tasks that you easily coped with in class? 2. Name the task that caused the difficulties. 3. Do you think you have reached the goal of learning today? |
PPT Slide (8) |
|||||||||||||||||||
|
Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners? |
Assessment – how are you planning to check learners’ learning? |
Health
and safety check |
|||||||||||||||||||
|
Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time. |
Use this section to record the methods that you will use to assess what the students have learned during the lesson.
|
Health and safety check links. Used active exercises. Items applied from the Safety Rules in this lesson. |
|||||||||||||||||||
|
Reflection
Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO? If not, why? Did my planned differentiation work well? Did I stick to timings? What changes did I make from my plan and why?
|
Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. |
||||||||||||||||||||
|
|
|||||||||||||||||||||
|
Summary evaluation
What two things went really well (consider both teaching and learning)?
1:
2:
What two things would have improved the lesson (consider both teaching and learning)?
1:
2:
What have I learned from
this lesson about the class or individuals that will inform my next lesson?
|
|||||||||||||||||||||
Скачано с www.znanio.ru
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.