Long-term plan unit: 10.1A Information Security |
School: |
||||
Date: |
Teacher name: |
||||
Grade: 10 |
Number present: |
absent: |
|||
The topic of the lesson:
|
Revision of Information Security |
||||
Learning objectives(s) that this lesson is contributing to |
10.1.2.1 explain the meaning of information security, confidentiality and data integrity 10.1.2.2 describe precaution measures, including the concepts of backup and data encryption 10.1.2.3 justify the use of various identification methods
|
||||
Lesson objectives |
explain the principles of Information Security |
||||
Success criteria |
All learners will be able to: · Know what is information security · Know what is information security measures · Know what is identification methods
|
||||
Language objectives
|
Subject vocabulary and terminology: Student is able to describe the meaning of information security, confidentiality and data integrity For instance, describe precaution measures, including the concepts of backup and data encryption Also, student is able to justify the use of various identification methods
Vocabulary and terminology specific to the subject: Information security, confidentiality and data integrity, backup and data encryption, identification methods
Useful expressions for dialogs and letters: Methods to identify…. Ways to protect …
|
||||
Value links |
Soft skills Respect for each other when working in groups
|
||||
Cross curricular links |
English |
||||
Previous learning |
previous lessons |
||||
Plan |
|||||
Planned lesson stages |
Planned activities |
Resources |
|||
Beginning
0-3
3-10 mins |
Organizational moment:
Discuss with students: Learning objectives Lesson objectives Success criteria Language objectives
Question for students:
Can you remember what we discussed in our previous lesson?
Teacher divides students in five groups and suggests the learners to discuss the following questions and tasks in groups:
1) What dangers can arise when transporting information over computer networks?
2) What methods do you know to identify a person when providing access to information?
3) What software and hardware ways do you know to protect the information?
4) In which situations there is a leak or loss of data?
5) Which data protection measures can be used for data integrity and confidentiality, including backup, encryption, and mirroring?
|
1-5 slides
6-7 slides
|
|||
Middle 10-20 min |
After discussing groups start presenting their thoughts on these questions and teacher slightly moves to the next tasks:
Teacher gives each group 3-5 definitions of one term that characterizes the situation. Let the learners discuss each definition and justify the choice of the best of them (the most complete and briefly stated definition).
Discuss the work of the groups and together formulate a definition of the concept of "information security", "confidentiality", "integrity", "accessibility".
|
8-9 slides
|
|||
20-37min |
Teacher asks students a questions about identification, checking their existing knowledge:
1) What is identification?
2) What are the methods of identification?
3) How does identification helps us in our everyday life?
4) Ask the groups to prepare arguments about the advantages, disadvantages of one of the identification methods and the prospects for further use.
|
10-11 slides
|
|||
The end of the lesson 37 - 40
|
At the end of the lesson, learners reflect on their learning: ✓ What did you learn in class? ✓ What was the most interesting? ✓ What was left incomprehensible? ✓ Was this lesson helpful to you?
|
12 slide
|
|||
Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners? |
Assessment – how are you planning to check learners’ learning? |
Health
and safety check |
|||
Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time. |
Use this section to record the methods that you will use to assess what the students have learned during the lesson.
|
Health and safety check links. Used active exercises. Items applied from the Safety Rules in this lesson. |
|||
Reflection
Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO? If not, why? Did my planned differentiation work well? Did I stick to timings? What changes did I make from my plan and why?
|
Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. |
||||
|
|||||
Summary evaluation
What two things went really well (consider both teaching and learning)?
1:
2:
What two things would have improved the lesson (consider both teaching and learning)?
1:
2:
What have I learned from
this lesson about the class or individuals that will inform my next lesson?
|
|||||
Скачано с www.znanio.ru
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.