Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore G8LP-1Cybercrime and Cyber Security

G8LP-1Cybercrime and Cyber Security

Published by Kanchan Singh, 2023-04-17 09:06:37

Description: G8LP-1Cybercrime and Cyber Security

Search

Read the Text Version

Lesson Plan - 1 Computer Science Cybercrime and Cyber Security Topic- Class: Period: Mode: Classroom/Lab Teacher: ____________________________________________________________________________________ Learning Support Assistant: ____________________________________________________________ S.M.A.R.T. Learning Objectives By the end of this session, students will be able to: 1. Define the terms cybercrime and cyberthreats. 2. Identify sources of cyberthreats. 3. Understand about some cyberthreats and their prevention. 4. Use Windows firewall and Windows Update features. 5. Appreciate the significance of proper use of emails. Resources Use the eContent to show the animated demos of the lesson wherever required. Session Conduction Engage: Ask the following questions to the class: Have you heard about: • Someone cheated online and lost money from their bank account? • Someone mocked online by their online friends on their looks or appearance? • Someone clicked a mail and a virus downloaded on the computer? • Someone downloaded a free game from internet and a harmful program downloaded on the computer along with it which deleted their importance files? • Somebody’s computer got hacked and all personal data is stolen? • Someone’s Facebook account was hacked and unconstitutional messages were sent from the account to others? Let the students respond to the questions. Discuss with them and conclude that these threats are heard often in news, read in newspapers. Concept introduction: Tell them that these are real incidents and this all comes under cybercrime – the crimes committed online. People who commit cybercrimes are called

cybercriminals and they pose cyberthreats to online users. But hackers and cybercriminals are not the only threats. There are harmful programs also. Ask the students this: • Where do you think harmful programs on our computers come from? Let them respond. Finally, the list should be like this: • Cybercriminals • Infected pen drives • Pirated software • Free games • Harmful email messages • Hacking apps Concept Demo/Explanation: Discuss the following: Virus: Harmful program that loads in computer memory and infects every files that is loaded in the memory. In the span of few days, as user works with more files, all the files get infected. Computer slows down, files get corrupted, renamed or deleted, disk may be formatted, files get encrypted, etc. Trojans: These are more harmful as they pose as a useful program or exciting game and once loaded, they damage the files and data. Worms: They are less harmful. They occupy lot of memory and slow down the computer. They make their copies and spread fast on a computer network. Protection and prevention: Discuss with the students the precautions you take as a teacher in using computers in office and home. Discuss use of anti-viruses, firewall, and Windows update. Open Windows and show them where the firewall settings are turned on/off. Also, show them the Windows Update option in Windows Settings. Discuss about spywares how they quietly monitor keyboard strokes and what happens on screen. This all is sent quietly to the hacker. If user types a password, keystrokes are recorded and password is known to the hacker. Screenshots of the screen tell a lot of useful things to hacker. Discuss how a good antivirus can protect from these threats. For emails, tell them that emails which are not wanted or welcomed are called spams. Emails from strange looking email addresses or strangers should not be opened and email messages from strangers but with grammatical mistakes should be deleted permanently (even from Trash folder). Email password should be kept secured and never give access to your email account even to friends. Anyone can make mistake. Concept Practice: Go to the first URL given at the end of the chapter and read online about Cyber ethics and cybercrime. Optional Activity: Watch the video in the resources section and discuss it with the teacher. Practical Application: N/A

Home Assignments Revise the topic covered. Evaluation After completing the lesson solve the exercises given at the end of the chapter.

Lesson Plan - 2 Computer Science Cybercrime and Cyber Security Topic- Class: Period: Mode: Classroom/Lab Teacher: ____________________________________________________________________________________ Learning Support Assistant: ____________________________________________________________ S.M.A.R.T. Learning Objectives By the end of this session, students will be able to: 1. Understand Resources Use the eContent to show the animated demos of the lesson. Session Conduction Engage: Do a 10 minutes recall of concepts from the previous session with this short quiz: • You got an email from KBC. What checks would you do? • You saw a new free game on internet. What will you do before downloading it? • You got a call from your bank to confirm your OTP. What will you do? • You forgot your ATM card in the ATM. What should you do immediately. • How will you use pen drive safely? • Do you install every useful program just because it is free? Why/Why not? Concept introduction: Now, discuss this with the students: If you see a website that looks exactly like your bank website and its URL begins with http instead of https then beware! It could be a hacker’s site impersonating your bank web site. They intent to steal your password. This criminal act is called phishing. Tell them the importance of https. Some hackers hack the browser to change the settings so that if user logs in, the details are redirected by the browser to their web site and they steal user data. Then discuss the protection from phishing and pharming.

Next, discuss about internet frauds – share instance of how people are cheated iin online scams. Ask students if to share if they have heard or read about any such incidents. Cyberbullying – in this discuss the ill effects of cyberbullying and also stress on that we should also not indulge in this malpractice. Tell the students how to safely use internet and be a good netizen. Give them tips what to do immediately if they get cyber bullied. For smart phones, tell the students that phones are utilities not toys. Phone addiction is bad. Too much screen time is waste of time and it affects minds negatively. Disciplined use of phone and internet is a must. Discuss the tips given in the book to use smart phone responsibly and safely. Concept Demo/Explanation: N/A Concept Practice: Go to the second URL given at the end of the chapter and read online about AI. Optional Activity: Watch the videos from the resources section. Practical Application: N/A Home Assignments 1. Revise the topic covered. 2. Practice the interactive exercises in Edusoft Smart App. Guided Assignment Revise the topic covered. Evaluation After completing the lesson solve the remaining exercises given at the end of the chapter.


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook