Lesson Plan

Lesson Plan
Grade: Date: 17/01/2026
Subject: Computer Science
Lesson Topic: Show understanding of the threats to computer and data security posed by networks and the internet
Learning Objective/s:
  • Describe the CIA triad and explain how network and internet threats affect confidentiality, integrity, and availability.
  • Identify and classify common network‑ and internet‑based threats such as eavesdropping, DoS, phishing, and SQL injection.
  • Analyse the probability of a successful attack using basic probability concepts.
  • Evaluate mitigation strategies and recommend layered security controls for given scenarios.
Materials Needed:
  • Projector or interactive whiteboard
  • Slide deck summarising threat categories and mitigations
  • Handout with threat tables and probability example
  • Laptop with internet access for a live packet‑sniffing demo (e.g., Wireshark)
  • Worksheets for group activity on mapping threats to the CIA triad
Introduction:
Begin with a short video clip of a recent high‑profile ransomware attack to capture interest. Ask students what they already know about how data can be compromised on a network or the internet, linking to prior lessons on encryption. Explain that by the end of the lesson they will be able to describe key threats, assess their impact on the CIA triad, and propose appropriate security controls.
Lesson Structure:
  1. Do‑now (5') – quick quiz on the CIA triad to activate prior knowledge.
  2. Mini‑lecture (10') – overview of threat categories (interception, interruption, modification, fabrication) with real‑world examples.
  3. Demonstration (10') – live packet capture using Wireshark to illustrate eavesdropping on an unsecured Wi‑Fi network.
  4. Group activity (15') – students map selected threats to the CIA triad and calculate attack probability using the formula Pₛ₍ₙ₎ = pⁿ.
  5. Discussion (10') – groups share findings; teacher introduces mitigation strategies and layered security concepts.
  6. Exit ticket (5') – each student writes one mitigation for a threat they found most critical.
Conclusion:
Summarise how each threat compromises one or more elements of the CIA triad and why layered defenses are essential. Have students complete an exit ticket naming the most effective mitigation for a selected threat. Assign homework to research a recent security breach and prepare a brief report on the threat vector and recommended preventive measures.