31_ppt_V1_Computer Science_10_Revision_Information Security

  • pptx
  • 10.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала 31_ppt_V1_Computer Science_10_Revision_Information Security.pptx

10.1A Information Security

Revision

Learning objectives

10.1.2.1 explain the meaning of information security, confidentiality and data integrity
10.1.2.2 describe precaution measures, including the concepts of backup and data encryption
10.1.2.3 justify the use of various identification methods

Lesson objectives

explain the principles of Information Security

Success criteria

All learners will be able to:
Know what is information security
Know what is information security measures
Know what is identification methods

Language objectives

Subject vocabulary and terminology:
Student is able to describe the meaning of information security, confidentiality and data integrity
For instance, describe precaution measures, including the concepts of backup and data encryption
Also, student is able to justify the use of various identification methods

Vocabulary and terminology specific to the subject:
Information security, confidentiality and data integrity, backup and data encryption, identification methods

Useful expressions for dialogs and letters:
Methods to identify….
Ways to protect …

Students divide into five groups and discuss the following questions and tasks in groups:

1) What dangers can arise when transporting information over computer networks?

2) What methods do you know to identify a person when providing access to information?

3) What software and hardware ways do you know to protect the information?

4) In which situations there is a leak or loss of data?

5) Which data protection measures can be used for data integrity and confidentiality, including backup, encryption?

Information Security

Next task

Discuss the work of the groups and together formulate a definition of the concept of
information security
confidentiality
integrity
accessibility

Identification methods

Questions

 1) What is identification?
2) What are the methods of identification?
3) How does identification helps us in our everyday life?
4) Ask the groups to prepare arguments about the advantages, disadvantages of one of the identification methods and the prospects for further use.

At the end of the lesson, learners reflect on their learning:

What did you learn in class?
What was the most interesting?
What was left incomprehensible?
Was this lesson helpful to you?