| Lesson Plan |
| Grade: |
Date: 01/12/2025 |
| Subject: Information Communication Technology ICT |
| Lesson Topic: Know and understand biometrics including the use of biometric data |
Learning Objective/s:
- Describe what biometrics are and differentiate physiological and behavioural types.
- Explain the four stages of a biometric authentication process (enrollment, storage, verification, decision).
- Evaluate the advantages, disadvantages, and security/privacy considerations of biometric systems.
- Compare common biometric methods (fingerprint, iris, facial, voice, hand geometry) using uniqueness, cost and error‑rate criteria.
- Apply a simple risk‑assessment framework to recommend an appropriate biometric solution for a given scenario.
|
Materials Needed:
- Projector and screen for slides/flowchart.
- Whiteboard and markers.
- Handouts summarising biometric types and comparison table.
- Sample biometric images (fingerprint, iris, facial).
- Laptop with internet access for a short video demo.
- Worksheets for the risk‑assessment activity.
|
Introduction:
Begin with a quick poll: how many students use fingerprint or facial recognition to unlock their phones. Link this to previous lessons on authentication methods and state the success criteria – by the end of the lesson students will be able to describe biometric processes, weigh their pros and cons, and recommend suitable applications.
|
Lesson Structure:
- Do‑now (5') – Students answer the poll and list biometric types they know.
- Mini‑lecture (15') – Overview of biometrics, physiological vs behavioural types, and the authentication workflow (enrollment → storage → capture → matching → decision) with a flowchart.
- Group comparison activity (20') – Using the provided table, groups fill a comparison chart for fingerprint, iris, facial, voice, and hand geometry, then discuss advantages and disadvantages.
- Risk‑assessment case study (15') – In small groups, evaluate a scenario (e.g., office access control) and decide which biometric modality fits, considering cost, privacy, FAR/FRR.
- Whole‑class debrief (10') – Groups present recommendations; teacher highlights security safeguards and legal considerations.
- Exit ticket (5') – Each student writes one key benefit and one key risk of using biometrics.
|
Conclusion:
Recap that biometrics provide strong identity proof but raise privacy and error‑rate challenges. Collect the exit tickets to check understanding, and assign homework: research a recent news story about a biometric data breach and prepare a brief summary for the next class.
|