Term: 2nd Term
Week: 7
Class: Senior Secondary School 3
Age: 17 years
Duration: 40 minutes of 2 periods each
Date:
Subject: Computer studies and ICT
Topic:- Computer security and ethics I
SPECIFIC OBJECTIVES:
At the end of the lesson, pupils should be able to
INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source
INSTRUCTIONAL MATERIALS: Videos, loud speaker, pictures, Data Processing for senior Secondary Education by Hiit Plc, WAPB Computer Studies for Senior Secondary III by Adekunle et al, On-line Materials.
INSTRUCTIONAL PROCEDURES
PERIOD 1-2
PRESENTATION |
TEACHER’S ACTIVITY |
STUDENT’S ACTIVITY |
STEP 1 INTRODUCTION |
The teacher reviews the previous lesson on data representation |
Students pay attention |
STEP 2 EXPLANATION |
He explains the meaning of computer security
|
Students pay attention and participates |
STEP 3 DEMONSTRATION |
He then lists outs the various sources of security breaches |
Students pay attention and participate |
STEP 4 NOTE TAKING |
The teacher writes a summarized note on the board |
The students copy the note in their books |
NOTE
COMPUTER SECURITY AND ETHICS
Computer security is the protection of computer components such as hardware, software and data from unauthorized access.
The need for computer security is as a result of a number of security breaches.
SOURCES OF SECURITY BREACHES
Security breach is an act of breaking security policies, practises or procedures.
When security in computer is breached, it may result in the damage of vital file, failure of certain hardware components e.g. keyboard, mouse, printer, hard disk, ram etc, altered software programs etc.
The following are possible sources of security breaches
A computer virus is an executable program that is capable of replicating itself thereby causing great harm to files or other programs on the computer it infects.
A computer can easily spread from in computer to the other with the use of external storage media such as: flash drives, floppy disks and so on it can also be contacted by downloading an infected file from the internet. The two types of computer viruses are WORMS and Trojan Horses.
a. WORMS: A worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Example of latest worm is Stuxnet(discovered in 2010)
b. TROJAN HORSES: A trojan horses is a computer program or file on the computer of a user that makes the computer susceptible to malicious intruders by allowing them to access and read users files. Trojan horses do not multiply themselves as in the case of worms. An example of the latest Trojan horse is Alureon(discovered in 2010)
A hacker is a clever programmer who tries to break into the computer systems.
A hacker understands the weak points in the security system and writes a program that will utilise the system. They are sometimes responsible for writing computer virus codes.
A complex computer network may result into poor implementation and management which in turn may give room to intruders who will eventually invade the computer network to steal passwords, confidential files or even infect all the network files.
When ICT security policy that controls or maintains the order in which people should conduct themselves when using ICT facilities barely exist due to poor implementation or ignorance, lawlessness will be in place and this can lead to security breach.
EVALUATION: 1. Define “computer security” and “security breach”
CLASSWORK: As in evaluation
CONCLUSION: The teacher commends the students positively