Sie sind auf Seite 1von 6

DETAILED LESSON PLAN IN

TECHNOLOGY AND LIVELIHOOD EDCUATION


ICT – Online Threats and Online Safety Security

I. Objectives
At the end of the lesson the students should be able to:
a. define Online Threats and Online Safety Security;
b. list down examples of online threats;
c. list down proper ways of using social networking sites;
d. list down ways on how you prevent cyber bullying.
e. list down ways on how to be a responsible cyber citizen.

II. Subject Matter


Topic: Online Safety Security Ethics and Etiquette.
Subtopic: Social Networking site and online threats
Reference: Empowerment Technologies by St. Andrew Publishing
Materials: PowerPoint presentation.

III. Procedures:

Teacher’s Activity Student’s Activity


Preparation
 Opening Prayer
(Teacher ask a volunteer to (Student come in front to lead the
lead the prayer) prayer)
 Greetings
 Checking of Attendance
 Arranging the chairs (Students pick up the pieces of paper
properly and pick up the and arrange the chair.)
pieces of paper or trash
under the chair.
 Review
(Teacher will ask the student
to give different tools using
in baking)

Motivation
(Divide the students into two groups for
the game)
PowerPoint Games (Family Feud)
Guide Question:
1. Give at least 6 social networking site.
2. Give at least 6 reasons why you are
using social networking site.
3. Give at least 6 online threats.
4. Give 5 online safety measures

Presentation and Discussion


Yes, Ma’am
Class, Do you have an idea what our topic (the students answer may vary)
for today? About Social Networking and Online
Threats.

Very good. Our topic is related to that.

The main topic for today is about Online


Threats and Online Safety Security
All of us are using the social networking
site.
Class on the games before you gave me the
list of social networking site and the reason
why you are using these social networking
sites.
(Present the PowerPoint)

What is Online safety?


Any idea? (the students answer may vary)
Online safety is refers to the practices
and precautions that should be
observed when using the internet.
Yes, Very Good.

Online Safety is refers to the practices and


pre-cautions that should be observed when
using the internet to ensure that the users as
well as their computers and personal
information are safe from crime associated
with using the internet.

What is Online Threats?


Who have an idea? (the students answer may vary)
Online Threats is a threat use in online
Online threats or “Web threat” is any world.
threat that uses the World Wide Web to
facilitate cybercrime. Web threats use
multiple types of malware and fraud.

Here are some of the common online


threats.

1. Phishing
Who have an idea about Phishing

(the students answer may vary)


Phishing is a type of scam where the
scammers disguise as a reliable
source in trying to attain private
information like passwords
Very Good
Phishing is a fraudulent attempt, usually
made through email, to steal your personal
information.

Class look at the example of phishing as


you can see the page is legitimate but if you
look at the search engine the address of
YouTube is different.

Here’s another example of phishing.

Even if a link has a name you recognize


somewhere in it, it doesn't mean it links to
the real organization. Look at the
information begin with “http” instead of
“https”— the "s" stands for secure. If you
don't see "https" do not proceed.

Another online threat is Malware.

What is Malware?
Who have an idea?
(the students answer may vary)
Malware is any program or file that
is harmful to a computer user
Very Good. Thank you.

Malware is short for “malicious software”


is any software intentionally designed to
cause damage server, client, or computer
network.

Here are some of the examples of Malware.

This online threat can steal, encrypt, or


delete your data, alter or hijack core
computer functions, and spy on your
computer activity without your knowledge
or permission. So if you see something akin
to “CONGRATULATIONS, YOU’VE
WON A FREE PSYCHIC READING!” in
a pop-up, don’t click on it. Whatever free
prize the ad promises, it will cost you plenty
because once you click it your system
repeatedly crashes, freezes, or displays a
Blue Screen of death, which can occur on
Windows systems after encountering a fatal
error.
(the students answer may vary)
Third online threats are viruses and worms
“virus” is a program designed to
Anyone What is viruses and worms? replicate by attaching itself into other
computer programs, data files or the
boot sector of the hard drive.
“worm” can be injected into a
network by any types of means, like
usb sticks or email attachment.

Very Good
Viruses and worms malicious programs
that self-replicate on computers or via
computer networks without the user being
aware; each subsequent copy of such
malicious programs is also able to self-
replicate.

Most known worms are spread as files sent


as email attachments, via a link to a web.

Another online threat is Keyloggers.


(the students answer may vary)
What is Keyloggers? Keyloggers referred to as keylogging
or keyboard capturing, is the action
of recording the keys struck on a
keyboard

Very Good. Correct


Keyloggers sometimes called a keystroke
logger or system monitor is a type of
surveillance technology used to monitor and
record each keystroke typed on a specific
computer's keyboard.

And the Last is Cybertalking.


Cybertalking is a form of cyberbullying
using Internet or other electronic means to
stalk or harass an individual, group, or
organization.
It may include false accusations,
defamation, slander and libel. It may also
include monitoring, identity theft, threats,
vandalism, solicitation for sex, or gathering
information that may be used to threaten,
embarrass or harass.

After we discuss the threats let’s discuss the


online measurements on How we prevent (the students will read the
this threats. PowerPoint presentation)

Can some read the first sentences?

ONLINE SAFETY MEASURES

 Never give any personal information


about yourself over the internet.
 Never open messages or
attachments from someone you do
not know.
 Be careful on what you say or post
online to protect your reputation.
 Use different passwords for each
account.
 Do not leave your computer or
personal electronic gadgets
unattended while logged in.
 When using public computer
terminal, be sure to delete your
browsing data before leaving.
 Keep your software updated.
 DO NOT download or install
software or anything that is
unknown to you.

Application

Now that you understand our lesson. I will


divide you into two groups. Each group will
have different activity from the other group.
I will give you 10 minutes to do your task
and after that, you have to present it to your
classmates. Each group need to choose 2
representatives. Make sure to have a unique
name to your group.

List down ways on how you prevent cyber


bullying.
(Maximum of 10 sentences)

List down ways on how to be a responsible


cyber citizen.
(Maximum of 10 sentences)

Generalization

(students answer may vary)


To wrap up our discussion, what have you
We are now familiar with online
learned today?
threats and we know how to prevent
these kinds of threats.

Nice job class. So, I guess that you are all


ready for our Quiz.
IV. Evaluation

Please get ¼ sheet of pad paper and answer the following questions.

1. It refers to the practices and pre-cautions that should be observed when using the internet.

2. Any threat that uses the World Wide Web to facilitate cybercrime.

3 - 8 Give 5 online threats

7-10 Give 5 online safety measures

V. Assignment

Make a slogan which promotes to stop cyberbullying. Write the slogan in a short bond paper. Decorate
it.

Das könnte Ihnen auch gefallen