1_Information Security_Lesson_plan_1_variant (2)

  • docx
  • 01.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала 1_Information Security_Lesson_plan_1_variant (2).docx

                                        Short Term Plan

Long-term plan unit:

10.1A Computer Systems and Information Security

School:

Date:

Teacher name:

Grade:

Number present:

absent:

The topic of the lesson:

 

Information Protection Methods

Learning objectives(s) that this lesson is contributing to

10.6.2.2 evaluate the necessity of data encryption

Lesson objectives

Know the differences between the concepts of information security, confidentiality, integrity and accessibility

Success criteria

All learners will be able to:

Explain the term encryption, decryption

Evaluate the necessity of data encryption

 

Language objectives

 

Subject vocabulary and terminology:

Data security, information privacy, data sustainability, data integrity, security measures, data integrity, information confidentiality, Encryption, decryption

Value links

Soft skills

Respect for each other when working in groups

 

Cross curricular links

English

Previous learning

Graphic types.  Different sources of information.

Plan

Planned lesson stages

Planned activities

Resources

Beginning

 

0-3

 

3-10

mins

Organizational moment: 

Question for students:

Can you remember what we discussed in our previous lesson?

 

The teacher will begin with a brief introduction into encryption and its importance.

 

 

 

 

 

Middle

10-25 min

 

 

Theory

-Discussion of how encryption is used in current technology

-Discussion of how encryption works and the various types of encryption

-Discussion of how encryption types vary in strength and security

-Students attempt to break simple encryptions using online software

 

Teacher divide students in 2 groups . 1 group make poster about encryption, 2 group – decryption.

 

People rely on encryption all the time when using the internet. Some of the uses of encryption include:

• Protecting credit card details or other sensitive information in online transactions.

• Protecting email communication from eavesdropping third parties

• Verifying the authenticity of software updates to prevent installation of malicious software

Without strong cryptographic algorithms, it would be impossible to hide information from others or verify the identity of anyone on the internet, and most of our modern internet infrastructure would not function.

A simple substitution cipher can be broken in fractions of a second by any modern computer.

Modern cryptography uses the idea of computational intractability – problems which take unreasonable amounts of time to solve Many algorithms are based on large prime numbers

• Multiplying two large primes: 15 microseconds

• Recovering the original two factors: 200,000 years

 

25-35min

-Kahoot quiz on general encryption knowledge

Kahoot.com

 

The end of the lesson

35 - 40

 

 

 

 

 

 

 

At the end of the lesson, learners reflect on their learning:

            What has been learned

            What remained unclear

            What needs more attention

Reflection Thermometer:

http://cs313826.vk.me/v313826507/998a/8YrriHaVI3U.jpg                          36,60С  interesting, useful

                          380С is not interesting, hard

                          340С useless, priceless

 

 

PPT Slide (8)

Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners?

Assessment – how are you planning to check learners’ learning?

Health and safety check
ICT links

Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time.

Use this section to record the methods that you will use to assess what the students have learned during the lesson.

 

Health and safety check links.

Used active exercises.

Items applied from the Safety Rules in this lesson.

Reflection

 

Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO?

If not, why?

Did my planned differentiation work well?

Did I stick to timings?

What changes did I make from my plan and why?

 

Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. 

 

 

 

 

 

 

 

 

 

Summary evaluation

 

 

What two things went really well (consider both teaching and learning)?

 

1:

 

2:

 

What two things would have improved the lesson (consider both teaching and learning)?

 

1:

 

2:

 

What have I learned from

 

this lesson about the class or individuals that will inform my next lesson?

 

 

 

 

 

 


 

Скачано с www.znanio.ru

Посмотрите также