Final Demonstration LP (LIE)

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

SEMI-DETAILED LESSON PLAN

Learning Grade Semester: Duration: 60


Area: Living Level: Second minutes
in IT Era BSED
ENGLISH
2

Learning Code:
Competency/ies:

Key Concepts/
Understanding to
be Developed:

I. Objectives:

Domain Within a 60-minute discussion, the BSED-ENG 2 students shall have


done the following with 85 % accuracy:

Knowledge identify the various kinds of information threats in the internet;

Skills determine if you are using the internet safely;

Attitudes reflect on the importance of policing the internet; and

Values

II. Content/ Lesson 2: Policing the Internet


Topic

III. Learning Link:


Resources/
Materials/ Powerpoint Presentation, Whiteboard, Whiteboard Marker , Paper,
Equipment Pen

IV. Procedures

1. Preliminary 1. Greeting
Activities 2. Prayer
3. Orderliness/Cleanliness of the Room
(5 minutes) 4. Checking of Attendance
5. Eliciting Prior Knowledge

The teacher will have a simple recall about the previous quarter
discussion.
Students will answer the following:
a. What was your last topic all about?
b. What have you learned from your last topic?

 MOTIVATION
The teacher show/write the word “Internet” and she will ask
the following question:
1. What is internet?
2. What are the advantages of Internet?
3. What are the disadvantages of Internet?

2. Activity The students will be called to answer “How Safe Are You?”
activity. Put a check (/) under Shared or Not shared
Type of information Shared Not shared
(10 minutes) 1. First Name

2. Last Name

3.Middle Name

4.Family
background

5.Problems

6.Your cellphone
number

7.Your address

8. Money

9. Status

10. Achievements

Note that activity will allow the students to have a brief


understanding about the topic (Policing the Internet) before
going in an in-depth understanding.

3. Analysis
Processed Questions:
(5 minutes) 1. What have you observed from the questions?
2. How does this relate to the word “Internet”?
3. Are those questions have something in common?

4. Abstraction
Using Powerpoint Presentation, the teacher will discuss about Living
in IT Era: Policing the Internet.

 Data Breach
- Data breach is a cybercrime in which cybercriminal extracts
(20 minutes) data from source. Usually, data breach is done through remote
network or through a physical access to a computer or
network.

Example of Data Breach:


- The 2013 Target Data Breach. Hackers gained access to
Target’s Computer System and stole credit card information
and personal data of over 41 million customers.
 Cybercriminals
- Cybercriminals are using data breach to get a way to perform
an information fraud, credit card duplication, theft, identity
theft, and other crime that will be needing a person’s personal
data.

 Cybercrime Police
- Internet police is an organization led by government agencies
in countries that are in charge with policing the internet.

Example:
- PNP’s Anti-Cyber Crime Group

 Usage of Security Applications


- Application security is protection for software, hardware and
another procedural method for external threats. Security is
designed to protect important files from unauthorized code
and reaching, stealing and removing of data.

 Types of Security Application


1. Auditing -recording and tracking the execution of the
application.

2. Authentication -it should be only the user who can log in and
run the application. Only the valid information can reach this
software.
3. Authorization -it should be only the authorized user who can
change edit, and read all the information inside the
application.

4. Cryptography -assurance of privacy to the user,


unauthorized user should not be able to edit, copy, or read the
information inside the application

 State of Privacy in the Internet


- Privacy is probably the most important thing that we need to
take care of when it comes to the internet.
- What is making theses public networks that dangerous? It’s
their lack of encryption.
- Encryption is the process of encoding information wherein
only the authorized people can access that information

 Some ways hackers can get into your device


1. Malware or Viruses attached to email
- Attaching malwares or viruses to emails is probably one of
the most popular methods of malware spread.
2. Links to malicious websites attached to emails
- Once you click on the attached link, it will lead you to a fake
website which will trick you, the user, to enter private
information which can be emails, passwords or even banking
details
3. Social Networking Pages
- Fake profiles can entice users into following a link to websites
wherein they can, again, get your information
4. Hijacking Advertisements
- Hackers or cybercriminals place ads containing malicious
codes on real websites.
5. Malicious Mobile Application
- If you think every application on Google Play store and Apple
store is safe and legit then you might want to think again.
Some applications may contain malicious codes that help
cyber criminals get your data.
6. Smishing
- This is phishing but via phone call or SMS messages. It is
when someone tricks you into giving them your information.

 Privacy Issues
- A privacy of an individual is essential because it is the key to
all of your social liberty and freedom.
- An American entrepreneur and philanthropist, Mark
Zuckerberg once said in 2010 that the users of today’s social
networking sites have developed more into being open
because of numerous and countless people sharing personal
information online and is continuously becoming expansive
every year.
- Philippines might have suffered its most terrible government
knowledge breach for just about a month before its elections.
Personal data, as well as fingerprint knowledge and passport
information that belong in a span of seventy million
individuals are alleged to have been compromised by hackers.

Examples:

- According to Philippines Daily Inquirer, there was a


discovery in the Central Bank of Bangladesh, where 81
million dollars were stolen.
- According to Suparna Goswami, another attack has occurred
on February 28, 2019 where an unauthorized third party
uncovered the database of Dow Jones with a record of more
than 2.4 million that contains private and secured information
in their business.

5. Application “Word Action”


The teacher will give a Number Action Activity to the students. The
teacher will give a certain words and each words has a corresponding
action.
(10 minutes) Words Actions

Privacy Clap
Internet Jump Forward

Issues Shake

The students who failed to act the corresponding action for that
certain word will have to pick a question from the teacher and answer
it in front.
These are the questions that the students will have to answer:
1. How do we protect our online identity?
2. What is the role of cybercrime police?
3. Give one example of cybercrime.
4. Give me some ways that hackers can get into your phone.
5. Give me one type of security application and its importance.

V. Assessment

Analysis of Essay!
Learner’s
Activity In a ½ crosswise sheet of paper, students will reflect on this question:

(5 minutes)  What is the importance of policing the internet?

VI. Wrap Up/ Concluding Activity

Check learnings The teacher will give a quote and will let her students reflect on it.
(3 minutes) “Privacy is not an option and it shouldn’t be the price we accept for
just getting on the Internet.”
By; Gary Kovacs

VII. Assignment
(2 minutes)
The teacher will instruct the students to study in advance for their
Summative Exam.

Prepared by

Name: Angeline B. Dedicatoria School: Colegio de San Antonio de Padua

Position/Designation: Student Teacher Division: Danao City

Contact Number: 09053507863 Email address: angelinebaritos@gmail.com

You might also like