Lesson Plan

Lesson Plan
Grade: Date: 01/12/2025
Subject: Information Communication Technology ICT
Lesson Topic: Know and understand biometrics including the use of biometric data
Learning Objective/s:
  • Describe what biometrics are and differentiate physiological and behavioural types.
  • Explain the four stages of a biometric authentication process (enrollment, storage, verification, decision).
  • Evaluate the advantages, disadvantages, and security/privacy considerations of biometric systems.
  • Compare common biometric methods (fingerprint, iris, facial, voice, hand geometry) using uniqueness, cost and error‑rate criteria.
  • Apply a simple risk‑assessment framework to recommend an appropriate biometric solution for a given scenario.
Materials Needed:
  • Projector and screen for slides/flowchart.
  • Whiteboard and markers.
  • Handouts summarising biometric types and comparison table.
  • Sample biometric images (fingerprint, iris, facial).
  • Laptop with internet access for a short video demo.
  • Worksheets for the risk‑assessment activity.
Introduction:
Begin with a quick poll: how many students use fingerprint or facial recognition to unlock their phones. Link this to previous lessons on authentication methods and state the success criteria – by the end of the lesson students will be able to describe biometric processes, weigh their pros and cons, and recommend suitable applications.
Lesson Structure:
  1. Do‑now (5') – Students answer the poll and list biometric types they know.
  2. Mini‑lecture (15') – Overview of biometrics, physiological vs behavioural types, and the authentication workflow (enrollment → storage → capture → matching → decision) with a flowchart.
  3. Group comparison activity (20') – Using the provided table, groups fill a comparison chart for fingerprint, iris, facial, voice, and hand geometry, then discuss advantages and disadvantages.
  4. Risk‑assessment case study (15') – In small groups, evaluate a scenario (e.g., office access control) and decide which biometric modality fits, considering cost, privacy, FAR/FRR.
  5. Whole‑class debrief (10') – Groups present recommendations; teacher highlights security safeguards and legal considerations.
  6. Exit ticket (5') – Each student writes one key benefit and one key risk of using biometrics.
Conclusion:
Recap that biometrics provide strong identity proof but raise privacy and error‑rate challenges. Collect the exit tickets to check understanding, and assign homework: research a recent news story about a biometric data breach and prepare a brief summary for the next class.