100% found this document useful (1 vote)
566 views6 pages

Detailed Lesson Plan in ICT

The document outlines a 48-minute lesson plan on internet threats. The objectives are to identify different internet threats, learn ways to minimize virus attacks, and explain practices for quarantining malwares. The lesson includes a presentation on internet threats, a discussion of threats like viruses, worms, and phishing, and tips for using antivirus software. Students are assigned to identify threats on their devices and how to protect computers. The teacher reflected that students were engaged in learning about relatable internet threats and ways to avoid and quarantine them.

Uploaded by

Kathleen Borja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
566 views6 pages

Detailed Lesson Plan in ICT

The document outlines a 48-minute lesson plan on internet threats. The objectives are to identify different internet threats, learn ways to minimize virus attacks, and explain practices for quarantining malwares. The lesson includes a presentation on internet threats, a discussion of threats like viruses, worms, and phishing, and tips for using antivirus software. Students are assigned to identify threats on their devices and how to protect computers. The teacher reflected that students were engaged in learning about relatable internet threats and ways to avoid and quarantine them.

Uploaded by

Kathleen Borja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Detailed Lesson Plan in ICT

Time: 48 minutes

I. Objectives
a. Identify the different internet threats
b. Reads the ways to minimize virus attacks in your personal computer.
c. Explain some practices on how to quarantine the different malwares.
II. Content
Topic: Internet Threats
References:
 https://g1galileoetech.wordpress.com/2017/10/16/internet-threats
III. Learning Resources
 Power Point Presentation
 Images
IV. Procedures

A. Before
Teacher’s Activity Student’s Activity
“Good morning Class...” Good morning ma’am”

“Before we start, Let us pray first” “Prays silently…Amen.”

“Lord, thank you for this wonderful day that


you’ve given us. We ask for your guidance
and wisdom all through this day. May we
accomplish our objectives for this day and
Keep us on
the right track, Amen.”

“May I know who’s absent for today?” “Student’s will response”

“How have you been Class? “ “We’re good ma’am”

“Are you ready for our next topic?” “Yes ma’am”

“Today we will tackle about the different internet


threats.”

B. During
Teacher’s Activity Student’s Activity
A. Motivation
“Do you guys know what a malware is?” “Student’s will response…”

Can you give me an example? “Virus…”

Have you ever encounter an Internet Threat? “Student’s will response yes/no”

“Questions what an Internet Threat is…”


“Will further discuss it to you”
B. Presentation
“I’m pleased to know that some of you are
familiar with Malwares and Internet Threats,
some of you even encounter it”

“Here are pictures of different Internet threats:


And a presentation of different Internet
threats”

And a presentation of different Internet threats (Students will watch the video presentation)

C. Lesson Proper
“Okay class let us discuss the different Internet
Threats,

“Can anyone read the first line?” (Student will volunteer to read)

INTERNET THREATS

1. Malware – stands for malicious software


a. Virus – a malicious program designed to
replicate itself and transfer from one computer
to another either through the internet and local
networks or data storage like flash
drives.
b. Worm – a malicious program that transfers
from one
computer to another by any type of means.
c. Trojan – a malicious program that is disguised
as useful program but once downloaded or
installed, leaves your PC unprotected and
allows hackers to get your information.
oh
*Rogue security software-tricks the user into
posing that it
is a security software. It asks the user to pay to
improve his/her security but in reality are not
protected at all.
d. Spyware – a program that runs in the
background without you knowing it (thus called
“spy”). It has the ability to monitor what you
are doing and typing through keylogging.
*Key loggers-used to record the keystroke done
by the users. This is done to steal their
password or any other sensitive information.
e. Adware – a program designed to send you
advertisements, mostly as pop-ups.

2. Spam – unwanted email mostly from bots or


advertisers. It can be used to send malware.

3. Phishing – Its goal is to acquire sensitive


personal
information like passwords and credit card
details.
D. Analyzation

“Okay guys, are you familiar with these Internet “Yes ma’am. Some can be found even on
threats? “ smartphones and computer”

“Yes, these Malwares can also be found in your (raises hands)


devices even if you’re offline. What threats are “Virus, Spam, Worm…”
you most familiar with?”

“Okay, you often heard viruses right?


Sometimes you mistakenly identify different
threat as a virus. But with our presentation and
discussion, it was shown that each threats have
its own identity and characteristics. “

“Are there any ways to avoid these threats


ma’am”

“Good question. Yes, there is”

“There are different ways to counteract this


threats and quarantine these malwares in such
an easy way”

Here are some tips to avoid such threats:

Rules to avoid Computer Virus Attacks!


1. Do Not browse websites that you don't trust.
2. Do Not open emails from anyone you don't
recognize.
3. Do Not allow people to use your computer
without
your knowledge.
4. Do Not download and run unrecognized
software, especially files with an .exe extension.

“Do you know other ways to protect your (raises hands)


computer from these malwares?” “Yes ma’am by simply downloading Antivirus”

“Very good, one of the best way to protect and


detect these threats is by downloading an Anti-
virus in your devices and computers.”

Do you know any anti-virus that is used in (raises hands)


computers? “Yes ma’am, Avast is a good antivirus program
that can help you protect your PC.”

“Yes, that’s right Avast is one of the most used


antivirus”

“Anything else? Anyone? There are lots of “Ma’am Norton Antivirus. It offers a number of
antiviruses” advantages over many of its antivirus
competitors. First and foremost, there's
“That’s very good class you are able to identify Norton's Life Lock identity theft protection,
different threats and ways to quarantine these which offers extensive protections against
viruses” identity theft.”
(students give their answers)
“Take note that always download a trusted “Yes ma’am”
antivirus program”

D. Generalization
“Now class let us remember the different
Internet Threats; Virus, Worms, Trojan Horse,
Spyware, Adware, Spam and Phishing. Now
these can be avoided by simply taking
precautions and downloading a trusted
antivirus program”

E. Application
Now make an illustration of an Internet threat
and include some ways to avoid these threats.

C. After
Teacher’s Activity Student’s Activity

That would be all for today everyone, I hope you


are able to take notes of these different internet
threats.

Now before we end our class for today, ______ (Student will lead the prayer)
please lead the closing prayer.

V. Assignment

Identify threats on your devices and write how you manage to protect your computer/devices.
VI. Remarks/Reflection

Student’s participation for today’s discussion was new for the students. I am glad that they are
somehow familiar with the different internet threats that helped them become relatable and
participative with the discussion. Through this they are able to relate situations wherein they have
encountered such threats and figured out things to avoid and quarantine the said internet threats.
Others are literate enough and that helps the discussion to be delivered smoothly. These things are
important for students/teachers to be familiar with especially we are living in a world where
technology develops on a rapid pace. Things such as malwares and Internet threats are just few of the
risk people can encounter on internet and other platforms. This lesson for sure helped them
familiarize different internet threats and gather ways on how to avoid these threats.
Kathleen B. Borja

Prepared by:

You might also like