Lesson Notes By Weeks and Term - Senior Secondary 3

Database security I

Term: 1st Term

Week: 8

Class: Senior Secondary School 3

Age: 17 years

Duration: 40 minutes of 2 periods each

Date:       

Subject:      Data Processing

Topic:-       Database security I

SPECIFIC OBJECTIVES: At the end of the lesson, pupils should be able to

  1. Define data security
  2. List and explain the types of data security

INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source

INSTRUCTIONAL MATERIALS: Videos, loud speaker, pictures, Data Processing for senior Secondary Education by Hiit Plc, WAPB Computer Studies for Senior Secondary I by Adekunle et al, On-line Materials.

INSTRUCTIONAL PROCEDURES

PERIOD 1-2

PRESENTATION

TEACHER’S ACTIVITY

STUDENT’S ACTIVITY

STEP 1

INTRODUCTION

The teacher reviews the previous lesson on computer maintenance

Students pay attention

STEP 2

EXPLANATION

He explains the meaning of data security

 

Students pay attention and participates

STEP 3

DEMONSTRATION

He then lists and explains the types of data security

Students pay attention and participate

STEP 4

NOTE TAKING

The teacher writes a summarized note on the board

The students copy the note in their books

 

NOTE

DEFINITION OF DATA SECURITY
Data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.

It is a means of putting in place the different form of information security controls to protect database against compromise of their confidentiality, integrity and availability.

 

RISK ASSESSMENT
This will enable you to identify the risks you are faced with and what could happen if valuable data is lost through theft, malware infection or a system crash.

 

SECURING DATA
Since data can be compromised in many ways, the best security against misuse or theft involves a combination of technical measures, physical security and a well-educated staff. You should implement clearly defined polices into your infrastructure and effectively present them to the staff.

 

TYPES OF SECURITY CONTROL ON THE DATA

  1. Access Control
    This is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
  2. Auditing
    Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to access information do not access it.
  3. Authentication
    This is the validation control that allows you to log into a system, email or blog account etc. Once logged in, you have various privileges until logging out. Some systems will cancel a session if your machine has been idle for a certain amount of time, requiring that you prove authentication once again to re-enter. You can log in using multiple factors such as a password, a smart card or even a fingerprint.
  4. Encryption
    This security mechanism uses mathematical scheme and algorithms to scramble data into unreadable text. It can only be decoded or decrypted by the party that possesses the associated key.
  5. Back Up
    This is the process of making copy and archiving of computer data in the event of data loss which is used to restore the original data.
  6. Password
    This is sequence of secret characters used to enable access to a file, program, computer system and other resources.

 

 

EVALUATION:    1. Explain data security

  1. List and explain the types of data security you know

CLASSWORK: As in evaluation

CONCLUSION: The teacher commends the students positively