|
Long-term plan unit: 10.1A Computer Systems and Information Security |
School: |
||||
|
Date: |
Teacher name: |
||||
|
Grade: |
Number present: |
absent: |
|||
|
The topic of the lesson:
|
Information Protection Methods |
||||
|
Learning objectives(s) that this lesson is contributing to |
10.6.2.2 evaluate the necessity of data encryption |
||||
|
Lesson objectives |
Know the differences between the concepts of information security, confidentiality, integrity and accessibility |
||||
|
Success criteria |
All learners will be able to: Explain the term encryption, decryption Evaluate the necessity of data encryption
|
||||
|
Language objectives
|
Subject vocabulary and terminology: Data security, information privacy, data sustainability, data integrity, security measures, data integrity, information confidentiality, Encryption, decryption |
||||
|
Value links |
Soft skills Respect for each other when working in groups
|
||||
|
Cross curricular links |
English |
||||
|
Previous learning |
Graphic types. Different sources of information. |
||||
|
Plan |
|||||
|
Planned lesson stages |
Planned activities |
Resources |
|||
|
Beginning
0-3
3-10 mins |
Organizational moment: Question for students: Can you remember what we discussed in our previous lesson?
The teacher will begin with a brief introduction into encryption and its importance.
|
|
|||
|
Middle 10-25 min
|
Theory -Discussion of how encryption is used in current technology -Discussion of how encryption works and the various types of encryption -Discussion of how encryption types vary in strength and security -Students attempt to break simple encryptions using online software
Teacher divide students in 2 groups . 1 group make poster about encryption, 2 group – decryption.
People rely on encryption all the time when using the internet. Some of the uses of encryption include: • Protecting credit card details or other sensitive information in online transactions. • Protecting email communication from eavesdropping third parties • Verifying the authenticity of software updates to prevent installation of malicious software Without strong cryptographic algorithms, it would be impossible to hide information from others or verify the identity of anyone on the internet, and most of our modern internet infrastructure would not function. A simple substitution cipher can be broken in fractions of a second by any modern computer. Modern cryptography uses the idea of computational intractability – problems which take unreasonable amounts of time to solve Many algorithms are based on large prime numbers • Multiplying two large primes: 15 microseconds • Recovering the original two factors: 200,000 years |
|
|||
|
25-35min |
-Kahoot quiz on general encryption knowledge |
Kahoot.com
|
|||
|
The end of the lesson 35 - 40
|
At the end of the lesson, learners reflect on their learning: ✓ What has been learned ✓ What remained unclear ✓ What needs more attention Reflection Thermometer:
380С is not interesting, hard 340С useless, priceless
|
PPT Slide (8) |
|||
|
Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners? |
Assessment – how are you planning to check learners’ learning? |
Health
and safety check |
|||
|
Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time. |
Use this section to record the methods that you will use to assess what the students have learned during the lesson.
|
Health and safety check links. Used active exercises. Items applied from the Safety Rules in this lesson. |
|||
|
Reflection
Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO? If not, why? Did my planned differentiation work well? Did I stick to timings? What changes did I make from my plan and why?
|
Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. |
||||
|
|
|||||
|
Summary evaluation
What two things went really well (consider both teaching and learning)?
1:
2:
What two things would have improved the lesson (consider both teaching and learning)?
1:
2:
What have I learned from
this lesson about the class or individuals that will inform my next lesson?
|
|||||
Скачано с www.znanio.ru
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.