| Lesson Plan |
| Grade: |
Date: 25/02/2026 |
| Subject: Information Communication Technology ICT |
| Lesson Topic: Know and understand characteristics and methods of protecting data including biometrics, digital certificate, secure socket layer (SSL), encryption, firewall, two-factor authentication, user id and password |
Learning Objective/s:
- Describe the purpose of data protection and the CIA (confidentiality, integrity, availability) triad.
- Explain how biometrics, digital certificates, SSL/TLS, encryption, firewalls, two‑factor authentication and passwords work, including their main advantages and limitations.
- Compare authentication with authorisation and evaluate which security controls suit a given scenario.
- Apply a layered security model to design a secure online transaction flow.
|
Materials Needed:
- Projector and screen
- Whiteboard and markers
- Printed handouts of the security‑methods table
- Laptops/tablets with internet access
- Demo of a browser SSL/TLS handshake (e.g., https site)
- Biometric sensor demo (fingerprint scanner or mobile device)
- Worksheet with revision questions and exit‑ticket space
|
Introduction:
Begin with a quick poll: “What would happen if your personal data were exposed?” Use responses to highlight the need for strong data protection. Review the CIA triad that students already know from previous lessons. State that by the end of class they will be able to identify and justify the use of key security methods.
|
Lesson Structure:
- Do‑now (5’) – Students write on sticky notes one example of a data breach they’ve heard about and the impact on confidentiality, integrity or availability.
- Mini‑lecture (10’) – Brief overview of why data protection is required and the difference between authentication and authorisation.
- Interactive table walk‑through (15’) – Using slides, explain each method (biometrics, digital certificate, SSL/TLS, encryption, firewall, 2FA, passwords). Students fill pros/cons in the handout.
- Group activity (15’) – Teams design a secure online‑banking flow, mapping each security method to the relevant CIA element.
- Demo (10’) – Show an SSL/TLS handshake in a browser and a biometric login on a device; discuss how the digital certificate is validated.
- Check for understanding (5’) – Exit ticket: “Name one security method you would prioritize for a new app and explain why.”
|
Conclusion:
Summarise how the layered approach combines multiple methods to protect data across the CIA triad. Collect exit tickets to gauge individual understanding. For homework, ask students to research a recent data breach and identify which security controls failed and how they could have prevented it.
|