Meaning and Examples of Information Security | Reasons Why We Need Information Security Primary 5 (Basic 5) Term 2 Week 8 Security Education

 

 

SECURITY EDUCATION

NATIONAL VALUES EDUCATION 

SECOND TERM

WEEK 8

PRIMARY 5

THEME – ELEMENTS OF SECURITY 

PREVIOUS LESSON – 

 

TOPIC – SECURITY INFORMATION 

 

LEARNING AREA

1. Introductory Activities

2. Meaning  and Examples of Information Security

3. Reasons for Information Security

4. Lesson Evaluation and Weekly Assessment (Test)

 

 

PERFORMANCE OBJECTIVES 

By the end of the lesson, most of the pupils should have attained the following objectives –

1. define information security.

2. tell why we need information security.

3. identify some of the security information.

 

 

ENTRY BEHAVIOUR

The pupils can state some of the reasons why we information security.

 

 

INSTRUCTIONAL MATERIALS

The teacher will teach the lesson with the aid of chart showing some of the security appliances.

 

 

METHOD OF TEACHING

Choose a suitable and appropriate methods for the lessons.

Note – Irrespective of choosing methods of teaching, always introduce an activities that will arouse pupil’s interest or lead them to the lessons. 

 

 

REFERENCE MATERIALS

1. Scheme of Work

2. 9 – Years Basic Education Curriculum

3. Course Book

4. All Relevant Material

5. Online Information

 

 

CONTENT OF THE LESSON

LESSON 1 – INTRODUCTION

MEANING OF INFORMATION SECURITY 

Information security is the protection of print, electronic, online or digital information from unauthorized activities.

 

 

The purpose is to ensure that our safety and privacy of sensitive information such as personal information, customer account details, financial data or intellectual property.

For example, the uses of Password, Passcode, Pattern, Face scanner, Eye scanner, Authentication, AntiVirus, etc. to protect information.

 

PASSWORD

Password is a secret word, phrase that is used to gain access to a place or information.

Word or phrase alone is considered to be a weak password. Strong password is the combination of word, number and special characteristics.

 

PASSCODE

Passcode is a number between 4 to 8 digits used for gaining access to a device or information.

 

PATTERN

Pattern is the movements of finger on the screen to gain access to a device or information.

 

FINGERPRINT 

Fingerprint is a finger recognition that confirm individual identity using their thumb.

 

FACE SCANNER 

Face scanner is a facial recognition that confirm individual identity using their face.

 

EYE SCANNER

Eye scanner is a eye recognition that confirm individual identity using their eyeball.

 

AUTHENTICATION

Authentication is additional code or pin used immediately after other password or passcode.

It is used to add confirm identity of the user.

Authentication is also known as 2FA or Two Way Factor

 

 

LESSON 2 – REASONS FOR INFORMATION SECURITY

The important reasons for information security are as follows:

1. To keep and protect sensitive information.

2. To prevent unauthorized users.

3. To prevent lost of information.

4. To protect customer information.

5. To ensure continuity.

6. To keep and protect confidentiality, integrity, availability, authenticity, and non-repudiation of user data.

 

 

LESSON 3 – REVISION AND WEEKLY ASSESSMENT (TEST) 

 

 

PRESENTATION

To deliver the lesson, the teacher adopts the following steps:

1. Teacher revises the previous lesson based on the pupil’s related knowledge or understanding.

Pupil’s Activities – Participate actively in the lesson review.

2. Teacher organizes the pupils in groups depending on the number in the class.

3. Teacher provides mobile device for each of the groups.

4. Teacher asks the groups to turn on the phone.

5. Teacher asks, what did you observed?

Pupil’s Activities – The pupils discuss their observations such as password, thumb or finger print, pattern, etc.

6. Teacher uses the pupil’s responses to introduction the lesson and discuss the meaning of information security.

Pupil’s Activities – The pupils pay attention to the lesson introduction to understand its concept.

7. Teacher asks pupils to state the reasons for the password.

Pupil’s Activities – The pupils mention and analyze the needs for information security.

8. Teacher summarizes the lesson on the board with appropriate lesson evaluation.

Pupil’s Activities – The pupils participate actively in the summary by responding correctly to the lesson evaluation and write as instructed.

 

 

CONCLUSION

To conclude the lesson for the week, the teacher revises the entire lesson and links it to the following week’s lesson.

 

 

NEXT LESSON

Meaning and Examples of Information Security | Reasons Why We Need Information Security Primary 5 (Basic 5) Term 2 Week 8 Security Education

 

 

LESSON EVALUATION 

Teacher asks pupils to:

1. define information security.

2. state five needs for information security.

3. identify some of the security information.

 

 

WEEKLY ASSESSMENT

INSTRUCTION – Answer all the questions. 

1. ________ is the protection of electronic information from unauthorized activities.

A. Information security

B. Information technology

C. Information password

 

2. It protects sensitive information from ________ such as recording, modification, inspection, damage or loss of use.

A. authorized activities

B. unauthorized dealer

C. unauthorized activities

 

3. Information security ensures ________ of personal or organization data such as customer account details, financial data or intellectual property.

A. safety

B. privacy

C. A and B

 

4. PIN means ________ with 4 to 8 digit number.

A. Personal Information Number

B. Personal Introduction Number

C. Personal Identification Number

 

5. ________ is a finger recognition that confirm individual identity using their thumb.

A. Fingerprint

B. Facebook

C. Face scanner

 

6. ________ is a facial recognition that confirm individual identity using their face.

A. Fingerprint

B. Facebook

C. Face scanner

 

 

7. ________ is a eye recognition that confirm individual identity using their eyeball.

A. Finger scanner

B. Eye scanner

C. Eye print scanner

 

8. ________ is additional code or pin used immediately after other password or passcode.

A. 2FA

B. 2face

C. 2 Factor

 

9. Authentication is also known as ________.

A. 2FA

B. 2face

C. 2 Factor

 

10. What is information security?

 

11. Differentiate between fingerprint and authentication.

 

State 4 reasons for Information Security.

12. ____________________

13. ____________________

14. ____________________

15. ____________________