Lesson Notes By Weeks and Term - Senior Secondary 3

Database security II

Term: 1st Term

Week: 9

Class: Senior Secondary School 3

Age: 17 years

Duration: 40 minutes of 2 periods each

Date:       

Subject:      Data Processing

Topic:-       Database security II

SPECIFIC OBJECTIVES: At the end of the lesson, pupils should be able to

  1. State the importance of data security
  2. Enumerate major threats to data security
  3. Discuss the purpose of backups
  4. Explain the meaning of application security

INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source

INSTRUCTIONAL MATERIALS: Videos, loud speaker, pictures, Data Processing for senior Secondary Education by Hiit Plc, WAPB Computer Studies for Senior Secondary I by Adekunle et al, On-line Materials.

INSTRUCTIONAL PROCEDURES

PERIOD 1-2

PRESENTATION

TEACHER’S ACTIVITY

STUDENT’S ACTIVITY

STEP 1

INTRODUCTION

The teacher reviews the previous lesson on data security

Students pay attention

STEP 2

EXPLANATION

He explains the importance of data security and enumerates the major threats to data security

 

Students pay attention and participates

STEP 3

DEMONSTRATION

He discusses the purpose of backups and also explains the meaning of application security

Students pay attention and participate

STEP 4

NOTE TAKING

The teacher writes a summarized note on the board

The students copy the note in their books

 

NOTE

IMPORTANCE OF DATA SECURITY

Data security is critical for most business and even home computer users. Client information, payment information, personal files, bank account details- all this information can be hard to replace and potentially dangerous if it falls into the wrong hands. 

Data lost due to disaster such as a flood of fire is crushing, but losing it to hackers or a malware infection can have much greater consequences.

 

MAJOR THREATS TO DATA SECURITY

  1. Accident can happen due to human error or software/ hardware error.
    b. Hackers could steal vital information and fraud can easily be perpetrated.
    c. Loss of data integrity.
    d. Improper data access to personal or confidential data.
    e. Loss of data availability through sabotage, a virus , or a worm.

 

INTEGRITY CONTROLS

BACKUPS
This is the process of copying and archiving of computer data so it may be used to restore the original after a data loss event.

Backups have two distinct purposes.

  1. The primary purpose is to recover data after its loss, be it by data deletion or corruption.
  2. The secondary purpose of backups is to recover data from an earlier time, according to a user-defined data retention policy, typically configured within a backup application for how long copies of data are required. Backup is just one of the disaster recovery plans.

 

APPLICATION SECURITY

Application security is the use of software, hardware and procedural methods to protect application from external threats.

 

EVALUATION:    1. State the importance of data security

  1. Enumerate the major threats to data security
  2. Outline the purposes of backups
  3. Explain the meaning of application security

CLASSWORK: As in evaluation

CONCLUSION: The teacher commends the students positively