Lesson Plan

Lesson Plan
Grade: Date: 17/01/2026
Subject: Information Technology IT
Lesson Topic: Explain the need for encryption
Learning Objective/s:
  • Describe why encryption is required for data protection.
  • Explain how encryption mitigates common security threats.
  • Compare symmetric and asymmetric encryption methods.
  • Calculate the impact of encryption on data size.
  • Evaluate legal and ethical implications of using encryption.
Materials Needed:
  • Projector and screen
  • Whiteboard and markers
  • Printed handout of threat‑countermeasure table
  • Laptop with encryption demo software (TLS, BitLocker)
  • Worksheet for size‑increase calculations
  • Internet access for short video clips
Introduction:
Imagine a laptop stolen from a coffee shop—without encryption the data is exposed to anyone who finds it. Students already understand confidentiality, integrity and availability from previous lessons. Today they will learn the reasons encryption is essential and how to recognise its role in real‑world security. Success will be shown when they can articulate at least three distinct reasons for using encryption.
Lesson Structure:
  1. Do‑now (5'): Quick discussion of recent data‑breach headlines; list what could have been prevented.
  2. Mini‑lecture (10'): Review confidentiality, integrity, availability and legal drivers (GDPR, HIPAA).
  3. Threats & Encryption Mapping (10'): Show the threat‑countermeasure table; students match threats to encryption solutions in pairs.
  4. Demonstration (10'): Live demo of TLS for network traffic and full‑disk encryption on a laptop; highlight ciphertext vs plaintext.
  5. Hands‑on Activity (15'): Worksheet – calculate ciphertext size using block‑cipher formula and choose appropriate encryption type for given scenarios.
  6. Summary & Exit Ticket (5'): Recap key points; students write one essential reason for encryption on a sticky note and hand it in.
Conclusion:
We revisited why encryption safeguards confidentiality, integrity and legal compliance, and saw it in action through demos and calculations. The exit ticket confirms understanding, and for homework students will research a recent ransomware incident and note how encryption (or its absence) affected the outcome.