Lesson Plan

Lesson Plan
Grade: Date: 01/12/2025
Subject: Information Communication Technology ICT
Lesson Topic: Know and understand privacy and confidentiality of data transfer
Learning Objective/s:
  • Describe the concepts of privacy and confidentiality in data transfer.
  • Explain how encryption, authentication and secure protocols protect data.
  • Identify common risks such as eavesdropping, MitM attacks and data breaches.
  • Evaluate appropriate security measures (encryption type, protocol, access controls) for a given scenario.
  • Apply legal and ethical considerations when handling personal data.
Materials Needed:
  • Projector and screen
  • Computer with internet access
  • Wireshark installed on demo machine
  • VPN client software (e.g., OpenVPN)
  • Handout summarising encryption types and protocols
  • Case‑study worksheets
Introduction:
Begin with a brief story about a recent high‑profile data breach to capture interest. Review students’ prior knowledge of networks and ask how data can be intercepted during transfer. State that by the end of the lesson they will be able to identify risks and select appropriate safeguards for secure data transfer.
Lesson Structure:
  1. Do‑now (5'): Students list ways data can be compromised during transfer; quick share.
  2. Mini‑lecture (10'): Define privacy, confidentiality, encryption, authentication, and secure protocols using slides.
  3. Demonstration (15'): Show packet sniffing with Wireshark on HTTP vs HTTPS and discuss findings.
  4. Hands‑on activity (20'): Students set up a VPN tunnel between two laptops, test connectivity, and record latency differences.
  5. Case‑study analysis (15'): Groups evaluate a breach scenario and propose mitigation measures using the checklist.
  6. Recap & Check (5'): Whole‑class quick quiz/exit ticket to confirm understanding.
Conclusion:
Summarise the importance of combining encryption, secure protocols and strong authentication to protect data in transit. Ask students to complete an exit ticket describing one measure they will implement in their own digital activities. Assign homework to research a recent data breach and prepare a one‑page summary of the privacy failures and how they could have been prevented.