Meaning of Internet Safety | The Uses of Safe Internet | Meaning and Types of Online Treat Primary 5 (Basic 5) Term 2 Week 9 Information Technology/Computer Studies

 

INFORMATION TECHNOLOGY

COMPUTER STUDIES 

SECOND TERM  

WEEK 9

PRIMARY 

THEME – BASIC CONCEPTS OF INFORMATION TECHNOLOGY 

PREVIOUS LESSON – 

 

TOPIC – SAFE INTERNET AND ONLINE TREAT 

 

LEARNING AREA

1. Introduction

2. Meaning and Uses of Internet Safety

3. Meaning and Types of Online Treat

4. Lesson Evaluation and Weekly Assessment (Test)

 

 

LEARNING OBJECTIVES 

By the end of the lesson, most pupils should have attained the following objectives –

1. different between Internet safety and threats.

2. explain the meaning of cybercrime.

3. state how Internet users are threaten.

4. discuss the types of Internet threat.

5. mention how to keep safety online.

6. state the reasons why people are victims of criminal online.

 

 

ENTRY BEHAVIOUR

The people can explain the meaning of stealing.

 

 

INSTRUCTIONAL MATERIALS

The teacher will teach the lesson with the aid of electronic devices.

 

 

METHOD OF TEACHING

Choose a suitable and appropriate methods for the lessons.

Note – Irrespective of choosing methods of teaching, always introduce an activities that will arouse pupil’s interest or lead them to the lessons. 

 

 

REFERENCE MATERIALS

1. Scheme of Work

2. 9 – Years Basic Education Curriculum

3. Course Book

4. All Relevant Material

5. Online Information

 

 

CONTENT OF THE LESSON  

LESSON 1 – INTRODUCTION 

Internet is a network that connects computers worldwide.

It is the largest computer network in the world.

It is no longer limited to personal computers, internet can be accessed through personal phone, tablet, television and other electronic devices.

 

CONCEPTS OF INTERNET SAFETY 

Internet safety is the practice of staying safe online without exposing yourself or losing your personal informations to Internet threats.

 

ONLINE SAFETY RULES AND TIPS

1. Use safe browsers.

2. Use strong passwords.

3. Change your passwords from time to time.

4. Don’t the same passwords for all your internet activities.

5. Don’t use personal or children’s details as passwords.

6. Use 2FA, two way factors.

7. Be professional online.

8. Make online payments or purchases from secure sites.

9. Be careful of what you posts or people you meet online.

10. Keep all your applications, programs or softwares  up to date.

11. Use a secure VPN connection.

12. Keep your social media accounts secure.

13. Backup data regularly.

14. Monitor online activities.

15. Be careful what you download.

16. Close unused accounts.

 

THE USES OF SAFE INTERNET

It is very important to use the internet wisely for the following reasons,

1. to protect your and family identity.

2. to prevent your devices from being harm.

3. to teach your children internet threats and dangers.

4. to prevent being exposed to unwanted materials or information.

5. to protect your businesses.

6. to secure your personal and private details such bank informations, credit cards, etc.

7. for safe keeping and peace of mind.

 

 

LESSON 2 – ONLINE OR INTERNET THREAT 

Internet threats is the practice that makes the Internet unsafe for the users.

It is also known as cybercrime or online threat.

Cybercrime is any criminal activity that that threatened the safety of Internet or online users.

 

TYPES OF ONLINE OR INTERNET THREATS 

There are different types of online or criminal activities,

1. Email and internet fraud

2. Identity fraud

3. Financial threat or card payment data.

4. Theft and sale of corporate data.

5. Cyber extortion or ransomware

6. Crypto jacking

7. Cyber espionage

 

1. EMAIL AND INTERNET FRAUD

Email and Internet fraud are the online criminal activities that deal with forged or faked electronic documents claiming to be legitimate.

 

2. IDENTIFY FRAUD

Identify fraud is the online criminal activity that use stolen identity to commit crime, deceive or defraud other people.

 

3. FINANCIAL THREAT OR CARD PAYMENT DATA

Financial threats are the online criminal activity that use people financial details or credit card to steal their money or make online payments and purchases.

 

4. BUSINESS AND CORPORATE IDENTITY THEFT 

Business and corporate identity theft are online criminal activities that steal business identity to buy or sale goods and services by establishing lines of credit with banks or retailers.

 

5. CYBER EXTORTION OR RANSOM WARE 

Cyber extortion or ransom ware is the online criminal activity that threat Internet users by hacking and holding their sensitive data until their demands for money are met.

 

6. CRYPTOJACKING

Cryptojacking in the online criminal activity that use people’s devices such computer, smartphone, tablet or server to mine or generate cryptocurrency.

 

7. CYBERESPIONAGE

Cyber espionage is the online criminal activity that steal classified data from corporates or governments for economic gain, competitive advantages, political reasons or to gain control of their operations.

 

 

LESSON 3 – REASONS WHY PEOPLE ARE VICTIMS OF CYBERCRIME 

There are reasons why most people became the victim of cyber criminal,

1. Greediness for money.

2. Carelessness

3. Ignorance

4. Cheap or free internet connectivity.

5. Outdated software, programs or applications.

6. Weak passwords

7. The uses of date of birth, children’s names or date of birth, etc.

 

 

PRESENTATION

To deliver the lesson, the teacher adopts the following steps:

1. To introduce the lesson, the teacher revises the previous lesson. Based on this, he/she asks the pupils some questions;

2. Teacher organizes the pupils in groups or pair depending on the size of the class.

3. Teacher asks pupils in groups or pairs to discuss the following,

  • who is a theft?
  • explain how people steal or take something that doesn’t belongs to them.

Pupil’s Activities – Respond as follows:

  • Theft is the act of stealing.
  • When the owners are careless to keep their possession in check.

4. Teacher listen to the pupils and uses their responses to introduce the lesson, online safety.

Pupil’s Activities – Pay attention to the lesson introduction to understand the concept of the online safety and threats.

5. Teacher displays chart showing different fake SMS, WhatsApp, email, etc. requesting people to do one thing or the other.

6. Teacher asks pupils to read the messages, use the message to explain the meaning of online safety and how to keep safe online.

Pupil’s Activities – Listen to the teacher’s explanation to understand and explain the meaning of online safety and state how to keep safe online.

7. Teacher tells pupils, anything that threatened the internet users online is known as internet threat, crime or cybercrime.

Pupil’s Activities – Listen to the teacher’s statement.

8. Teacher discussion the meaning and types of online threats with the pupils with experience if you have one. For example, MMM.

Pupil’s Activities – Explain the meaning and types of online threats.

9. Teacher asks pupils as a group or pair to say the reason why people lose their money, assets or properties to thefts.

10. Teacher uses the group’s or pair’s responses to introduce and leads a discussion on the reason why people are become victims online.

Pupil’s Activities – State and analyze how people become victims online.

11. Teacher summarizes the lesson on the board with appropriate evaluation.

Pupil’s Activities – Participate actively in the summary of the lesson and write as instructed.

 

 

CONCLUSION

To conclude the lesson for the week, the teacher revises the entire lesson and links it to the following week’s lesson.

 

 

NEXT LESSON

HyperText Mark Up Language | HTML Tags and their Functions Primary 5 (Basic 5) Term 2 Week 10 Information Technology/Computer Studies

 

 

LESSON EVALUATION 

Teacher asks pupils,

1. different between Internet safety and threats.

2. explain the meaning of cybercrime.

3. discuss how Internet users are threaten.

4. discuss 3 types of Internet threat.

5. mention 5 ways to keep safety online.

6. state 5 reasons why people are victims of criminal online.