Learning objectives(s) that this lesson
is contributing to
10.1.2.1 explain the meaning of
information security, confidentiality and
10.1.2.2 describe precaution measures,
including the concepts of backup and data encryption
10.1.2.3 justify the use of various
explain the principles of Information Security
All learners will be able to:
·Know what is information security
·Know what is information security measures
·Know what is identification methods
Subject vocabulary and terminology:
Student is able to describe the meaning of information security, confidentiality
and data integrity
For instance, describe precaution
measures, including the concepts of backup and data encryption
Also, student is able to justify the use
of various identification methods
Vocabulary and terminology specific to the subject:
Information security, confidentiality and data integrity, backup and data encryption, identification methods
Useful expressions for dialogs and letters:
Methods to identify….
Ways to protect …
Respect for each other when
working in groups
Cross curricular links
Planned lesson stages
Discuss with students:
Question for students:
Can you remember what we discussed in our
Teacher divides students
in five groups and suggests the learners to discuss the following questions
and tasks in groups:
1) What dangers can
arise when transporting information over computer networks?
2) What methods do you
know to identify a person when providing access to information?
3) What software and
hardware ways do you know to protect the information?
which situations there is a leak or loss of data?
5) Which data protection measures can be used
for data integrity and confidentiality, including backup, encryption, and
After discussing groups
start presenting their thoughts on these questions and teacher slightly moves
to the next tasks:
Teacher gives each group 3-5 definitions of one term that characterizes the
situation. Let the learners discuss each definition and justify the choice of
the best of them (the most complete and briefly stated definition).
Discuss the work of the groups and
together formulate a definition of the concept of "information
security", "confidentiality", "integrity",
Teacher asks students a questions about
identification, checking their existing knowledge:
1) What is identification?
2) What are the methods of
3) How does identification helps us in
our everyday life?
4) Ask the groups to
prepare arguments about the advantages, disadvantages of one of the
identification methods and the prospects for further use.
The end of the lesson
37 - 40
At the end of the lesson,
learners reflect on their learning:
you learn in class?
the most interesting?
lesson helpful to you?
– how do you plan to give more support? How do you plan to challenge the more
– how are you planning to check learners’ learning?
and safety check
Differentiation can be
expressed in the selection of tasks, in the expected result from a particular
student, in providing individual support to the student, in selecting the
educational material and resources, taking into account the individual
abilities of the students (Theory of Multiple Intelligence by Gardner).
Differentiation can be used at any stage of the lesson, taking into account
the rational use of time.
this section to record the methods that you will use to assess what the
students have learned during the lesson.
Health and safety check
Used active exercises.
Items applied from the
Safety Rules in this lesson.
Were the lesson objectives/learning
objectives realistic? Did all learners achieve the LO?
If not, why?
Did my planned differentiation work
Did I stick to timings?
What changes did I make from my plan and
Use the space below to reflect on your
lesson. Answer the most relevant questions from the box on the left about
What two things went really well
(consider both teaching and learning)?
What two things would have improved the
lesson (consider both teaching and learning)?
What have I learned from
this lesson about the class or
individuals that will inform my next lesson?
Short Term Plan Long-term plan unit: 10
Beginning 0-3 3-10 mins
Ask the groups to prepare arguments about the advantages, disadvantages of one of the identification methods and the prospects for further use
What have I learned from this lesson about the class or individuals that will inform my next lesson?