Browse through topics for Junior Secondary 2 1st, 2nd and 3rd Terms, All Weeks, All Subjects
Term: 3rd Term
Week: 10
Class: Junior Secondary School 2
Age: 13 years
Duration: 40 minutes
Date:
Subject: Security Education
Topic:- Elements of security
SPECIFIC OBJECTIVES: At the end of the lesson, pupils should be able to
INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source
INSTRUCTIONAL MATERIALS: Videos, loud speaker, textbook, pictures
INSTRUCTIONAL PROCEDURES
PERIOD 1
PRESENTATION |
TEACHER’S ACTIVITY |
STUDENT’S ACTIVITY |
STEP 1 INTRODUCTION |
The teacher revises the previous lesson on the neighborhood duties and responsibilities of students of members of the community |
Students pay attention |
STEP 2 EXPLANATION |
She explains the meaning of elements of security |
Students pay attention and participates |
STEP 3 DEMONSTRATION |
She discusses each of the elements of security
|
Students pay attention and participate |
STEP 4 NOTE TAKING |
The teacher writes a summarized note on the board |
The students copy the note in their books |
NOTE
Elements of security
Elements of security are the essential principles for effective security. These elements are
A person of integrity is a person without gaps, who isn't prone to dishonesty, cheating, lying, stealing, or other moral shortcomings. This is especially important in the context of cyber security, where a lack of integrity from an employee or even a department can lead to a huge security breach.
It can be defined as permitting approved personnel to accessing protected information and places. Confidentiality takes care of confidential information and other resources which must be revealed to legitimate and authorized personnel only.
Authenticity is another essential element, and authentication can be defined as the process of ensuring and confirming that the identity of every individual is genuine and legitimate.
Availability is protecting the functionality of support systems and ensuring data/resources is fully available at the point in time (or period requirements) when it is needed by its users
EVALUATION: 1. Define elements of security
CLASSWORK: As in evaluation
CONCLUSION: The teacher commends the students positively