Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
LESSON PLAN IN ICT
I. OBJECTIVES:
At the end of 45 minutes discussion, the students should be able to:
1. Identify the different types of cyber threats in your personal computer.
2. Reads the ways to minimize virus attacks in your personal computer.
3. Explain some practices on how to quarantine the cyber threats in your personal computer.
II. SUBJECT MATTER
A. Topic: Cyber Security Threats
B. References:
● https://onlinedegrees.und.edu/blog/types-of-cyber-security-threats/
● https://onlinedegrees.und.edu/blog/types-of-cyber-attacks/
C. Materials:
● PowerPoint presentation, Projector, coloring materials, cartolina, manila paper, markers
E. Values Integration:
● The students will realize the importance of knowing how to keep the computer safe from cyber threats.
F. Skills: Identifying, describing, and discussing.
III. LEARNING TASKS
TEACHER’S HINT Teacher’s Activity Student’s Activity
A. Preliminary
Activities
1. Greetings Good morning class! Good morning, Sir.!
2. Prayer Please stand up and let us pray. Mario kindly led the prayer.
Praise be the name of our Lord Jesus
Christ….
3. Classroom
Management
Before you take your seat, please pick up the pieces of paper and dirt under your chair then
arrange your seat properly.
4. Checking of
attendance
Once your name is called, kindly raise your hand, and say presently.
5. Checking of
assignment
B. Recall
Do we have any assignments?
Who can give us a recap of what we discussed at the last meeting? Yes, Carol.
Excellent Carol! And What about the Networks or communication networks?
Yes, Alana Marie.
Very good!
No Sir!
Sir last meeting we discussed the networks.
A network, or communications network, is a
system of interconnected computers,
telephones, or other communications
devices that can communicate with one
another and share applications and data.
C. Unlocking of
Terms
These are some of the terms that you will encounter later in our discussion.
Unlocking of Terms
1. Malware is malicious software such as spyware, ransomware, viruses, and worms.
2. Trojan Horse is a program that pretends to be a useful program, usually free, such as a game
or screensaver but carries viruses, or destructive instructions, that perpetrate mischief
without your knowledge.
3. A worm is a program that copies itself repeatedly into a computer’s memory or onto a disk
drive.
4. Denial of service (DoS) is a type of cyber-attack that floods a computer or network so it can’t
respond to requests.
5. Phishing attacks use fake communication, such as an email, to trick the receiver into opening
it and carrying out the instructions inside, such as providing a credit card number.
6. Password Attacks – with the right password, a cyber attacker has access to a wealth of
information.
The learners will read the following terms.
D. Lesson Proper
ACTIVITY The demo teacher will group the class into 3 and present a video. The learners will listen
carefully and take note of the important details. The learners will create a graphic organizer
and answer the guide questions. They will be given 5 minutes to prepare their graphic organizer
after watching the video.
Before we start with our lesson today, I want you to watch this video and jot down important
details to be able to answer the questions later. After watching the video, you’re going to create
a graphic organizer to answer the guide questions.
GUIDE QUESTIONS:
1. What is a Cyber Security Threat?
2. What are cyber threats that can damage your personal computer?
3. What are the different types of malwares?
4. Describe how you can avoid your computer from these cyber threats.
You will be rated according to this rubric. Do you want to add anything to the rubric?
RUBRICS/ MECHANICS:
5 4 3 2 1
Validity of the
answer
All the answers are
correct
One of the
answers is wrong
Some of the
answers are not
related to the topic.
Almost all of the
answers are wrong.
All the answers are
wrong.
Accuracy of
the
explanation
Explained the
answer to the
question excellently
and correctly.
Explained the
answer to the
question
Lacks some
explanation in each
answer.
Lacks some
explanation in each
answer.
Did not correctly
explain their answer.
Delivery/
presentation
The presentation is
clear,
understandable,
brief, and concise.
The presentation
is clear,
understandable,
brief, and concise.
Some parts of the
presentation are
not clear,
understandable,
brief, and concise.
Most parts of the
presentation are
not clear,
understandable,
brief, and concise.
The presentation is
not clear,
understandable, brief,
and concise.
Timeliness/
speed
Finish the activity
on or before time.
Finish the activity
5 minutes late.
Finish the activity
10 minutes late.
Finish the activity
15 minutes late.
Finish the activity 20
minutes late.
No, Sir!
ANALYSIS The learners will now present their work. They will be given 2 minutes to present their output.
Let us call Group 1. Let’s give them Barangay Clap!
Group 2. Let’s give them an Amazing Clap!
Group 3. Let’s give them Nice Clap!
Good job everyone! Now let us check if your answers are correct.
GUIDE QUESTIONS:
 What is a Cyber Security Threat?
Possible Answers:
A cyber security threat refers to any possible malicious attack that seeks to unlawfully access
data, disrupt digital operations, or damage information.
 What are cyber threats that can damage your personal computer?
Possible Answers:
Based on the video I presented to you, there are 4 different types of cyber threats. Malware,
Denial of Service, Phishing, and Password Attacks
 What are the different types of malwares?
Possible Answers:
Spyware, ransomware, viruses, and worms.
 Describe how you can avoid your computer from these cyber threats.
Possible Answers:
a. Don’t recycle passwords.
b. Don’t click on suspicious links when browsing the web.
c. Routinely back up data.
d. Use two-factor authentication.
e. Regularly update devices.
f. Don’t use public wi-fi without protection.
g. Use a virtual private network.
Group Presentation!
ABSTRACTION Based on our activity, what is a Cyber security threat?
A cyber security threat refers to any possible malicious attack that seeks to unlawfully access
data, disrupt digital operations, or damage information. Cyber threats can originate from
various actors, including corporate spies, hacktivists, terrorist groups, hostile nation-states,
criminal organizations, lone hackers, and disgruntled employees.
4 Types of Cyber Security Threats
1. Malware
Malware is malicious software such as spyware, ransomware, viruses, and worms. Malware is
activated when a user clicks on a malicious link or attachment, which leads to installing
dangerous software. Cisco reports that malware, once activated, can:
 Block access to key network components (ransomware)
 Install additional harmful software.
 Covertly obtain information by transmitting data from the hard drive (spyware)
 Disrupt individual parts, making the system inoperable.
A cyber security threat refers to any possible
malicious attack that seeks to unlawfully
access data, disrupt digital operations, or
damage information.
2. Denial of Service
A denial of service (DoS) is a type of cyber-attack that floods a computer or network so it can’t
respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates
from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake”
process and carry out a DoS. Several other techniques may be used, and some cyber attackers
use the time that a network is disabled to launch other attacks.
3. Phishing
Phishing attacks use fake communication, such as an email, to trick the receiver into opening it
and carrying out the instructions inside, such as providing a credit card number. “The goal is to
steal sensitive data like credit card and login information or to install malware on the victim’s
machine,” Cisco reports.
4. Password Attacks
With the right password, a cyber attacker has access to a wealth of information. Social
engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers
use that relies heavily on human interaction and often involves tricking people into breaking
standard security practices.” Other types of password attacks include accessing a password
database or outright guessing.
Cyber Security Tips for Individuals
1. Don’t recycle passwords.
2. Don’t click on suspicious links when browsing the web.
3. Routinely back up data.
4. Use two-factor authentication.
5. Regularly update devices.
6. Don’t use public wi-fi without protection.
7. Use a virtual private network.
Security matters class are a never-ending problem, with attacks on computers and data
becoming more powerful and more complex. Do you have any questions? None, Sir!
APPLICATION Each group will now create a poster about Cyber Security Threats and how to prevent the
threats using the information discussed. The learners should be creative in making their posters
and will use the materials provided by the teacher.
After 10 minutes, they will now present their work.
Well done, class! Your posters are beautiful and informative!
Group Presentation!
IV. EVALUATION Get one-half crosswise and explain some practices on how to quarantine or minimize the cyber
threats in your personal computers, in just two to three sentences only.
V. ASSIGNMENT ● Research about the Cyber Villains: Hackers & Crackers.
● What is the type of hackers and crackers?

More Related Content

Lessonplan-1 (1).docx

  • 1. LESSON PLAN IN ICT I. OBJECTIVES: At the end of 45 minutes discussion, the students should be able to: 1. Identify the different types of cyber threats in your personal computer. 2. Reads the ways to minimize virus attacks in your personal computer. 3. Explain some practices on how to quarantine the cyber threats in your personal computer. II. SUBJECT MATTER A. Topic: Cyber Security Threats B. References: ● https://onlinedegrees.und.edu/blog/types-of-cyber-security-threats/ ● https://onlinedegrees.und.edu/blog/types-of-cyber-attacks/ C. Materials: ● PowerPoint presentation, Projector, coloring materials, cartolina, manila paper, markers E. Values Integration: ● The students will realize the importance of knowing how to keep the computer safe from cyber threats. F. Skills: Identifying, describing, and discussing. III. LEARNING TASKS TEACHER’S HINT Teacher’s Activity Student’s Activity A. Preliminary Activities 1. Greetings Good morning class! Good morning, Sir.! 2. Prayer Please stand up and let us pray. Mario kindly led the prayer. Praise be the name of our Lord Jesus Christ…. 3. Classroom Management Before you take your seat, please pick up the pieces of paper and dirt under your chair then arrange your seat properly. 4. Checking of attendance Once your name is called, kindly raise your hand, and say presently. 5. Checking of assignment B. Recall Do we have any assignments? Who can give us a recap of what we discussed at the last meeting? Yes, Carol. Excellent Carol! And What about the Networks or communication networks? Yes, Alana Marie. Very good! No Sir! Sir last meeting we discussed the networks. A network, or communications network, is a system of interconnected computers, telephones, or other communications devices that can communicate with one another and share applications and data. C. Unlocking of Terms These are some of the terms that you will encounter later in our discussion. Unlocking of Terms 1. Malware is malicious software such as spyware, ransomware, viruses, and worms. 2. Trojan Horse is a program that pretends to be a useful program, usually free, such as a game or screensaver but carries viruses, or destructive instructions, that perpetrate mischief without your knowledge. 3. A worm is a program that copies itself repeatedly into a computer’s memory or onto a disk drive. 4. Denial of service (DoS) is a type of cyber-attack that floods a computer or network so it can’t respond to requests. 5. Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. 6. Password Attacks – with the right password, a cyber attacker has access to a wealth of information. The learners will read the following terms. D. Lesson Proper ACTIVITY The demo teacher will group the class into 3 and present a video. The learners will listen carefully and take note of the important details. The learners will create a graphic organizer and answer the guide questions. They will be given 5 minutes to prepare their graphic organizer after watching the video.
  • 2. Before we start with our lesson today, I want you to watch this video and jot down important details to be able to answer the questions later. After watching the video, you’re going to create a graphic organizer to answer the guide questions. GUIDE QUESTIONS: 1. What is a Cyber Security Threat? 2. What are cyber threats that can damage your personal computer? 3. What are the different types of malwares? 4. Describe how you can avoid your computer from these cyber threats. You will be rated according to this rubric. Do you want to add anything to the rubric? RUBRICS/ MECHANICS: 5 4 3 2 1 Validity of the answer All the answers are correct One of the answers is wrong Some of the answers are not related to the topic. Almost all of the answers are wrong. All the answers are wrong. Accuracy of the explanation Explained the answer to the question excellently and correctly. Explained the answer to the question Lacks some explanation in each answer. Lacks some explanation in each answer. Did not correctly explain their answer. Delivery/ presentation The presentation is clear, understandable, brief, and concise. The presentation is clear, understandable, brief, and concise. Some parts of the presentation are not clear, understandable, brief, and concise. Most parts of the presentation are not clear, understandable, brief, and concise. The presentation is not clear, understandable, brief, and concise. Timeliness/ speed Finish the activity on or before time. Finish the activity 5 minutes late. Finish the activity 10 minutes late. Finish the activity 15 minutes late. Finish the activity 20 minutes late. No, Sir! ANALYSIS The learners will now present their work. They will be given 2 minutes to present their output. Let us call Group 1. Let’s give them Barangay Clap! Group 2. Let’s give them an Amazing Clap! Group 3. Let’s give them Nice Clap! Good job everyone! Now let us check if your answers are correct. GUIDE QUESTIONS:  What is a Cyber Security Threat? Possible Answers: A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations, or damage information.  What are cyber threats that can damage your personal computer? Possible Answers: Based on the video I presented to you, there are 4 different types of cyber threats. Malware, Denial of Service, Phishing, and Password Attacks  What are the different types of malwares? Possible Answers: Spyware, ransomware, viruses, and worms.  Describe how you can avoid your computer from these cyber threats. Possible Answers: a. Don’t recycle passwords. b. Don’t click on suspicious links when browsing the web. c. Routinely back up data. d. Use two-factor authentication. e. Regularly update devices. f. Don’t use public wi-fi without protection. g. Use a virtual private network. Group Presentation! ABSTRACTION Based on our activity, what is a Cyber security threat? A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations, or damage information. Cyber threats can originate from various actors, including corporate spies, hacktivists, terrorist groups, hostile nation-states, criminal organizations, lone hackers, and disgruntled employees. 4 Types of Cyber Security Threats 1. Malware Malware is malicious software such as spyware, ransomware, viruses, and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:  Block access to key network components (ransomware)  Install additional harmful software.  Covertly obtain information by transmitting data from the hard drive (spyware)  Disrupt individual parts, making the system inoperable. A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations, or damage information.
  • 3. 2. Denial of Service A denial of service (DoS) is a type of cyber-attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. 3. Phishing Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports. 4. Password Attacks With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing. Cyber Security Tips for Individuals 1. Don’t recycle passwords. 2. Don’t click on suspicious links when browsing the web. 3. Routinely back up data. 4. Use two-factor authentication. 5. Regularly update devices. 6. Don’t use public wi-fi without protection. 7. Use a virtual private network. Security matters class are a never-ending problem, with attacks on computers and data becoming more powerful and more complex. Do you have any questions? None, Sir! APPLICATION Each group will now create a poster about Cyber Security Threats and how to prevent the threats using the information discussed. The learners should be creative in making their posters and will use the materials provided by the teacher. After 10 minutes, they will now present their work. Well done, class! Your posters are beautiful and informative! Group Presentation! IV. EVALUATION Get one-half crosswise and explain some practices on how to quarantine or minimize the cyber threats in your personal computers, in just two to three sentences only. V. ASSIGNMENT ● Research about the Cyber Villains: Hackers & Crackers. ● What is the type of hackers and crackers?