Lesson Plan

Lesson Plan
Grade: Date: 25/02/2026
Subject: Information Communication Technology ICT
Lesson Topic: Know and understand other authentication methods including zero login, biometric methods, magnetic stripes, smart cards, physical tokens, electronic tokens
Learning Objective/s:
  • Describe the principles of zero‑login, biometric, magnetic stripe, smart card, physical token, and electronic token authentication methods.
  • Compare the advantages, disadvantages and typical use cases for each method.
  • Evaluate factors for selecting appropriate authentication methods for different network scenarios.
  • Explain how multi‑factor authentication enhances security in ICT environments.
Materials Needed:
  • Projector and screen
  • Computer with internet access
  • Printed handouts of authentication method comparison table
  • Sample magnetic stripe card and smart card (or images)
  • Demo app for software token (e.g., Google Authenticator)
  • Whiteboard and markers
Introduction:

Begin with a quick poll: “How many of you use a fingerprint or face scan to unlock your phone?” This links to students’ everyday experience of authentication. Explain that today’s lesson will explore a range of methods beyond passwords, and students will be able to identify strengths, weaknesses and suitable contexts for each. Success criteria: students can describe each method and justify its use in a given scenario.

Lesson Structure:
  1. Do‑now (5’) – Students list authentication methods they use daily on a sticky note.
  2. Mini‑lecture (10’) – Overview of zero‑login, biometric, magnetic stripe, smart card, physical and electronic tokens with slide deck.
  3. Group activity (15’) – Each group receives a method card; they create a brief pros/cons list and present.
  4. Demonstration (10’) – Show a software token app and a smart card reader demo.
  5. Case‑study analysis (10’) – Students evaluate a corporate VPN scenario and recommend suitable authentication methods using selection factors.
  6. Check for understanding (5’) – Quick Kahoot quiz covering key concepts.
Conclusion:

Recap the key characteristics and appropriate contexts for each authentication method. Ask students to write one takeaway on an exit ticket and submit it. For homework, assign a short report comparing two methods of their choice, focusing on security, cost and usability.