Lesson Plan

Lesson Plan
Grade: Date: 25/02/2026
Subject: Information Communication Technology ICT
Lesson Topic: Know and understand characteristics and effect of threats to data including hacking, phishing, pharming, smishing, vishing, viruses, malware, card fraud
Learning Objective/s:
  • Describe characteristics and effects of common data threats such as hacking, phishing, pharming, smishing, vishing, viruses, malware, and card fraud.
  • Identify delivery methods and social‑engineering techniques used in each threat.
  • Evaluate preventive measures and appropriate response actions for compromised data.
  • Apply knowledge to analyse a real‑world scenario and recommend security safeguards.
Materials Needed:
  • Projector and screen
  • Whiteboard and markers
  • Printed handout with threat summary table
  • Sample phishing email and SMS screenshots
  • Laptops/tablets with internet access
  • Quiz/exit ticket sheets
Introduction:
Begin with a quick poll: how many students have received a suspicious email or text in the past month? Recall that data security relies on recognizing threat vectors we’ve studied previously, such as weak passwords. Today we will explore the full range of modern threats and their impact, aiming to be able to spot and counter them.
Lesson Structure:
  1. Do‑now (5') – students list any recent suspicious communications they’ve encountered and share briefly.
  2. Mini‑lecture (15') – overview of each threat (hacking, phishing, pharming, smishing, vishing, viruses, malware, card fraud) with key characteristics and effects, using slides and the summary table.
  3. Interactive analysis (15') – in pairs, examine sample phishing email, smishing SMS, and a mock malware alert; identify threat type, delivery method, and likely effects.
  4. Prevention brainstorm (10') – groups create a quick poster of two preventive measures for each threat and share with the class.
  5. Formative quiz (10') – Kahoot or paper quiz covering definitions, effects, and safeguards; immediate feedback.
Conclusion:
Summarise that understanding the delivery method and social‑engineering cues is essential for early detection. For exit, each student writes one actionable tip they will apply to protect their data. Homework: research a recent news story about a data breach and prepare a short summary of the threat involved and the mitigation steps taken.