Functions of Information Security Primary 5 (Basic 5) Term 2 Week 9 Security Education

 

SECURITY EDUCATION

NATIONAL VALUES EDUCATION 

SECOND TERM

WEEK 9

PRIMARY 5

THEME – ELEMENTS OF SECURITY 

PREVIOUS LESSON – Meaning and Examples of Information Security | Reasons Why We Need Information Security Primary 5 (Basic 5) Term 2 Week 8 Security Education

 

TOPIC – SECURITY INFORMATION 

 

LEARNING AREA

1. Introductory Activities

2. Meaning of Information Security

3. Types of Information Security

4. Lesson Evaluation and Weekly Assessment (Test)

 

 

PERFORMANCE OBJECTIVES 

By the end of the lesson, most of the pupils should have attained the following objectives –

1. explain the meaning of information security.

2. state the types of information security.

 

 

ENTRY BEHAVIOUR

The pupils can state some of the reasons why we information security.

 

 

INSTRUCTIONAL MATERIALS

The teacher will teach the lesson with the aid of chart showing some of the security appliances.

 

 

METHOD OF TEACHING

Choose a suitable and appropriate methods for the lessons.

Note – Irrespective of choosing methods of teaching, always introduce an activities that will arouse pupil’s interest or lead them to the lessons. 

 

 

REFERENCE MATERIALS

1. Scheme of Work

2. 9 – Years Basic Education Curriculum

3. Course Book

4. All Relevant Material

5. Online Information

 

 

CONTENT OF THE LESSON

LESSON 1 – INTRODUCTION

Information security is the protection of electronic information from unauthorized activities.

Examples of information security are password, passcode, etc.

 

CONTINUATION – EXAMPLES OF INFORMATION SECURITY 

FINGERPRINT 

Fingerprint is a finger recognition that confirm individual identity using their thumb.

 

FACE SCANNER 

Face scanner is a facial recognition that confirm individual identity using their face.

 

EYE SCANNER

Eye scanner is a eye recognition that confirm individual identity using their eyeball.

 

AUTHENTICATION

Authentication is additional code or pin used immediately after other password or passcode.

It is used to add confirm identity of the user.

Authentication is also known as 2FA or Two Way Factor

 

 

LESSON 2 – FUNCTIONS OF INFORMATION SECURITY 

The functions of information security are as follows:

1. It forster a culture of empowerment and improvement.

2. It increases accountability.

3. It demonstrates a consistent information security.

3. It priorities information assets and processes

5. It identifies and priorities risks.

6. It improves security capacity and capability.

7. It guarantees good governance and organization engagement.

8. It preserves the integrity of data.

9. It makes date available for the authorized users.

10. It enhances best practice.

 

 

LESSON 3 – REVISION AND WEEKLY ASSESSMENT (TEST) 

 

 

PRESENTATION

To deliver the lesson, the teacher adopts the following steps:

1. Teacher revises the previous lesson based on the pupil’s related knowledge or understanding.

Pupil’s Activities – Participate actively in the lesson review.

2. Teacher continues with the examples of information security.

Pupil’s Activities – Identify and describe other examples of information security.

3. Teacher uses some of the reasons why we need information security to lead a discuss on the functions of information security.

Pupil’s Activities – Pay attention and analyze the function of information security to their personal security

4. Teacher summarizes the lesson on the board.

Pupil’s Activities – Participate activity in the summary and write as instructed.

 

 

CONCLUSION

To conclude the lesson for the week, the teacher revises the entire lesson and links it to the following week’s lesson.

 

 

NEXT LESSON

 

 

LESSON EVALUATION 

Teacher asks pupils to:

1. explain the meaning of information security.

2. give 5 examples of information security.

3. state 5 functions of information security.

 

 

REVISION/WEEKLY ASSESSMENT (TEST) 

1. ________ is the protection of electronic information from unauthorized activities.

A. Information security

B. Information technology

C. Information password

 

2. It protects sensitive information from ________ such as recording, modification, inspection, damage or loss of use.

A. authorized activities

B. unauthorized dealer

C. unauthorized activities

 

3. Information security ensures ________ of personal or organization data such as customer account details, financial data or intellectual property.

A. safety

B. privacy

C. A and B

 

4. PIN means ________ with 4 or 6 digit number.

A. Personal Information Number

B. Personal Introduction Number

C. Personal Identification Number

 

5. ________ is a finger recognition that confirm individual identity using their thumb.

A. Fingerprint

B. Facebook

C. Face scanner

 

6. ________ is a facial recognition that confirm individual identity using their face.

A. Fingerprint

B. Facebook

C. Face scanner

 

7. ________ is a eye recognition that confirm individual identity using their eyeball.

A. Finger scanner

B. Eye scanner

C. Eye print scanner

 

8. ________ is additional code or pin used immediately after other password or passcode.

A. 2FA

B. 2face

C. 2 Factor

 

9. Authentication is also known as ________.

A. 2FA

B. 2face

C. 2 Factor

 

10. What is information security?

 

11. Differentiate between fingerprint and authentication.

 

State 4 functions of Information Security.

12. ________________________________________________

13. ________________________________________________

14. ________________________________________________

15. ________________________________________________