Term: 1st Term
Week: 8
Class: Senior Secondary School 3
Age: 17 years
Duration: 40 minutes of 2 periods each
Date:
Subject: Data Processing
Topic:- Database security I
SPECIFIC OBJECTIVES: At the end of the lesson, pupils should be able to
INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source
INSTRUCTIONAL MATERIALS: Videos, loud speaker, pictures, Data Processing for senior Secondary Education by Hiit Plc, WAPB Computer Studies for Senior Secondary I by Adekunle et al, On-line Materials.
INSTRUCTIONAL PROCEDURES
PERIOD 1-2
PRESENTATION |
TEACHER’S ACTIVITY |
STUDENT’S ACTIVITY |
STEP 1 INTRODUCTION |
The teacher reviews the previous lesson on computer maintenance |
Students pay attention |
STEP 2 EXPLANATION |
He explains the meaning of data security
|
Students pay attention and participates |
STEP 3 DEMONSTRATION |
He then lists and explains the types of data security |
Students pay attention and participate |
STEP 4 NOTE TAKING |
The teacher writes a summarized note on the board |
The students copy the note in their books |
NOTE
DEFINITION OF DATA SECURITY
Data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.
It is a means of putting in place the different form of information security controls to protect database against compromise of their confidentiality, integrity and availability.
RISK ASSESSMENT
This will enable you to identify the risks you are faced with and what could happen if valuable data is lost through theft, malware infection or a system crash.
SECURING DATA
Since data can be compromised in many ways, the best security against misuse or theft involves a combination of technical measures, physical security and a well-educated staff. You should implement clearly defined polices into your infrastructure and effectively present them to the staff.
TYPES OF SECURITY CONTROL ON THE DATA
EVALUATION: 1. Explain data security
CLASSWORK: As in evaluation
CONCLUSION: The teacher commends the students positively