Lesson Notes By Weeks and Term - Senior Secondary 3

Computer security and ethics II

Term: 2nd Term

Week: 8

Class: Senior Secondary School 3

Age: 17 years

Duration: 40 minutes of 2 periods each

Date:       

Subject:      Computer studies and ICT

Topic:-       Computer security and ethics II

SPECIFIC OBJECTIVES:

At the end of the lesson, pupils should be able to

  1. list preventive and discuss preventive measures against security breaches

INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source

INSTRUCTIONAL MATERIALS: Videos, loud speaker, pictures, Data Processing for senior Secondary Education by Hiit Plc, WAPB Computer Studies for Senior Secondary III by Adekunle et al, On-line Materials.

INSTRUCTIONAL PROCEDURES

PERIOD 1-2

PRESENTATION

TEACHER’S ACTIVITY

STUDENT’S ACTIVITY

STEP 1

INTRODUCTION

The teacher reviews the previous lesson on computer security

Students pay attention

STEP 2

EXPLANATION

He lists the preventive measures against security breaches

 

Students pay attention and participates

STEP 3

DEMONSTRATION

He discusses each preventive measure.

Students pay attention and participate

STEP 4

NOTE TAKING

The teacher writes a summarized note on the board

The students copy the note in their books

 

NOTE

PREVENTIVE MEASURES AGAINST SECURITY BREACHES

  1. Use of antivirus software

Antivirus software is able to protect the computer from virus. If the computer is infected, it is able to detect the virus and heal the system. In some cases the infected file is deleted. Examples of good antivirus software are: ESET, NORTION, SYMANTEC, QUICK HEAL and many more.

 

  1. Using firewall

A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.

 

  1. Care should be taken to ensure that personal information (such as passwords, email addresses, etc) is not disclosed to any person through any means. It is advised that persons should change their password often or when they notice any intrusion.

 

  1. Encryption: Encryption is the conversion of data into a form that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.

 

  1. There is a need to have a proper network implementation and management policy

 

  1. Use websites with security certificates because they are secured

 

  1. Do not download file attachments from unknown sources.

 

  1. Read about new hacking technologies and preventive measures frequently to keep you updated.

 

EVALUATION:    1. List and explain five preventive measures against                                       security breaches

 

CLASSWORK: As in evaluation

CONCLUSION: The teacher commends the students positively