| Lesson Plan |
| Grade: |
Date: 25/02/2026 |
| Subject: Computer Science |
| Lesson Topic: Describe security measures designed to protect computer systems, ranging from the stand-alone PC to a network of computers |
Learning Objective/s:
- Describe common security threats to computers and networks.
- Explain how physical, software, and network controls protect confidentiality, integrity, and availability.
- Compare security measures for stand‑alone PCs versus networked environments.
- Apply appropriate encryption and backup strategies based on system context.
- Evaluate the role of security policies and user‑awareness training.
|
Materials Needed:
- Projector and screen
- Slide deck summarising threats and controls
- Handout with comparison table (PC vs. network)
- Demo computers with antivirus and encryption tools installed
- Network diagram for discussion
- Whiteboard and markers
|
Introduction:
Begin with a quick poll: “What’s the most frightening thing that could happen to your laptop or school network?” Connect responses to prior knowledge of the CIA triad, then outline that by the end of the lesson students will be able to identify and justify layered security measures for both stand‑alone and networked systems.
|
Lesson Structure:
- Do‑now (5'): Students list three recent headlines about cyber‑attacks on personal devices or organisations.
- Mini‑lecture (10'): Overview of common threats and the CIA principles using slides.
- Group activity (15'): Compare security measures for a stand‑alone PC vs. a networked system using the handout table; each group creates a short poster.
- Demo & discussion (10'): Show encryption (BitLocker) and firewall configuration on a demo PC; discuss how these scale to network devices.
- Policy brainstorm (10'): In pairs, draft one key point for a school security policy (e.g., password rules, phishing training).
- Check for understanding (5'): Quick Kahoot quiz covering terminology and differences.
- Reflection (5'): Students write one takeaway on an exit ticket.
|
Conclusion:
Recap the layered approach to security, emphasizing how each control contributes to confidentiality, integrity, and availability. Collect exit tickets as a retrieval check and assign homework: research a recent security breach and write a brief analysis of which controls failed and how they could be improved.
|