Lesson Plan

Lesson Plan
Grade: Date: 17/01/2026
Subject: Computer Science
Lesson Topic: Describe security methods designed to protect the security of data
Learning Objective/s:
  • Describe the five core security principles: confidentiality, integrity, availability, authentication, and non‑repudiation.
  • Explain how symmetric and asymmetric encryption work and identify appropriate use cases.
  • Compare hash functions, digital signatures and access‑control models.
  • Apply security concepts to evaluate a simple data‑protection scenario.
Materials Needed:
  • Projector and screen
  • Slide deck covering security principles
  • Handout with key terms and diagrams
  • Sample Python code snippets for encryption demo
  • Worksheets with scenario‑based questions
  • Access to an online encryption tool (e.g., CrypTool)
Introduction:

Begin with a quick poll: “If a hacker accessed your laptop tomorrow, which of your files would be safe?” Discuss responses to highlight the need for data protection. Recall that students already understand basic data storage concepts. Explain that by the end of the lesson they will be able to list core security principles and describe how encryption protects data.

Lesson Structure:
  1. Do‑now (5'): Poll results discussion and outline success criteria.
  2. Mini‑lecture (10'): Present the five security principles with real‑world examples.
  3. Demonstration (10'): Show symmetric vs. asymmetric encryption using an online tool and simple Python code.
  4. Guided practice (15'): Students hash a message, create a digital signature, and verify it in pairs.
  5. Group activity (10'): Compare DAC, MAC, and RBAC; design a brief access‑control policy for a school database.
  6. Check for understanding (5'): Exit‑ticket question – “Which encryption method would you choose for encrypting large files and why?”
Conclusion:

Recap the key principles, encryption types, and access‑control models covered today. Collect exit tickets to gauge understanding and assign a short homework: research one emerging data‑security technology and write a two‑sentence summary.