IDENTIFICATION OF DIFFERENT SECURITY INFORMATION

Subject : Security Education 

Class : Primary 5

Term : Second Term

Week : Week 9

Topic :

IDENTIFICATION OF DIFFERENT MEASURES USED IN SECURITY INFORMATION

Behavioural Objectives : By the end of the lesson, pupils should be able to

  • Explain information security’s
  • Say why we need information security
  • Identify some of the information security

Previous TopicMEANING AND IDENTIFICATION OF DIFFERENT SECURITY INFORMATION

Entry Behaviour : The pupils can relate to different information that they can give you to help friend’s or the ones that they have already given out.

Instructional Materials :

  • Wall charts
  • Pictures
  • Related Online Video
  • Flash Cards

Methods of Teaching :

  • Class Discussion
  • Group Discussion
  • Asking Questions
  • Explanation
  • Role Modelling
  • Role Delegation

Reference Materials :

  • Scheme of Work
  • Online Information
  • Textbooks
  • Workbooks
  • 9 Year Basic Education Curriculum

Content :

IDENTIFICATION OF DIFFERENT MEASURES USED IN SECURITY INFORMATION

List of Common Types of Information Security Measures:

  1. Fingerprint Scanning: This technology verifies an individual’s identity by scanning their fingerprint, typically their thumbprint.
  2. Facial Recognition: A method of identifying a person by analyzing patterns in their facial features, captured by a scanner.
  3. Eye Scanning: An eye recognition system that confirms a person’s identity by scanning their eye, such as the iris or retina.
  4. Two-Factor Authentication (2FA): A security process that requires users to provide two forms of identification, such as a password and a one-time code generated by a device, to confirm their identity and access sensitive information.

Note: It’s important to understand that these technologies are commonly used as part of a larger security framework and are not foolproof. They are just one piece of the puzzle and can be bypassed if not used in conjunction with other security measures.

Evaluation

  1. What is the purpose of fingerprint scanning in information security? A. To scan an individual’s hand B. To verify an individual’s identity C. To keep track of time
  2. Which type of recognition system is used to identify a person by analyzing patterns in their facial features? A. Eye scanning B. Facial recognition C. Fingerprint scanning
  3. What is the purpose of two-factor authentication (2FA) in information security? A. To provide two forms of identification B. To access sensitive information C. To keep track of passwords
  4. What is the most common type of biometric identification used in information security? A. Iris scanning B. Fingerprint scanning C. Facial recognition
  5. What type of authentication is used as a backup for a password or passcode? A. Two-factor authentication B. Single-factor authentication C. Multi-factor authentication
  6. What type of biometric identification uses eye recognition to confirm a person’s identity? A. Facial recognition B. Fingerprint scanning C. Eye scanning
  7. What is the purpose of authentication in information security? A. To add confirmation of the user’s identity B. To generate random passwords C. To store sensitive information
  8. What is the full form of 2FA in information security? A. Two-Factor Authentication B. Three-Factor Authentication C. Four-Factor Authentication
  9. Which type of authentication requires users to provide two forms of identification to access sensitive information? A. Single-factor authentication B. Two-factor authentication C. Multi-factor authentication
  10. What is the most secure method of information security? A. Eye scanning B. Facial recognition C. The use of multiple, layered security measures.

Key Functions of Information Security

  1. Cultivating a Culture of Empowerment and Improvement: Information security aims to create a culture where employees are empowered to take responsibility for their actions and to continuously improve their knowledge and skills.
  2. Improving Accountability: Information security helps to increase accountability by clearly defining roles and responsibilities, and providing appropriate training and resources.
  3. Maintaining Consistent Information Security: Information security helps organizations to maintain consistent security standards and processes across the organization, ensuring that all employees follow the same guidelines and procedures.
  4. Protecting Information Assets and Processes: Information security prioritizes the protection of critical information assets and processes, helping organizations to minimize the risk of data breaches and unauthorized access to sensitive information.
  5. Identifying and Managing Risks: Information security helps organizations to identify and prioritize risks, and implement appropriate controls to mitigate those risks.
  6. Enhancing Security Capacity and Capability: Information security helps organizations to improve their overall security posture by building capacity and capability through continuous learning and development.
  7. Promoting Good Governance and Engagement: Information security helps organizations to promote good governance and engage stakeholders in the security process, fostering trust and transparency.
  8. Preserving Data Integrity: Information security helps organizations to preserve the integrity of their data by ensuring that it is accurate, complete, and secure.
  9. Making Data Available to Authorized Users: Information security helps organizations to make their data available to authorized users, while protecting it from unauthorized access and misuse.
  10. Encouraging Best Practices: Information security helps organizations to adopt and maintain best practices in security, ensuring that they remain at the forefront of the industry and are well-prepared for evolving threats.

Evaluation

  1. What is the main purpose of cultivating a culture of empowerment and improvement in information security? A. To improve accountability B. To increase employee engagement C. To improve knowledge and skills
  2. What is the primary function of information security in terms of improving accountability? A. To provide appropriate training and resources B. To preserve data integrity C. To make data available to authorized users
  3. What is the role of information security in maintaining consistent security standards and processes? A. To identify and prioritize risks B. To improve security capacity and capability C. To ensure all employees follow the same guidelines and procedures
  4. What is the primary objective of information security in protecting information assets and processes? A. To minimize the risk of data breaches B. To promote good governance and engagement C. To encourage best practices
  5. What is the primary function of information security in identifying and managing risks? A. To implement appropriate controls B. To improve knowledge and skills C. To increase employee engagement
  6. What is the role of information security in enhancing security capacity and capability? A. To provide appropriate training and resources B. To build capacity and capability through continuous learning and development C. To make data available to authorized users
  7. What is the primary purpose of promoting good governance and engagement in information security? A. To build trust and transparency B. To minimize the risk of data breaches C. To encourage best practices
  8. What is the main function of information security in preserving data integrity? A. To ensure data is accurate, complete, and secure B. To improve knowledge and skills C. To provide appropriate training and resources
  9. What is the role of information security in making data available to authorized users? A. To protect data from unauthorized access and misuse B. To promote good governance and engagement C. To encourage best practices
  10. What is the main objective of information security in encouraging best practices? A. To ensure organizations remain at the forefront of the industry B. To improve knowledge and skills C. To provide appropriate training and resources

NOTE

  1. Information security is the protection of electronic information from unauthorized activities.
  2. It protects sensitive information from unauthorized activities such as recording, modification, inspection, damage or loss of use.
  3. Information security ensures safety and privacy of personal or organization data such as customer account details, financial data or intellectual property.
  4. PIN means Personal Identification Number with 4 or 6 digit number.
  5. Fingerprint is a finger recognition that confirms individual identity using their thumb.
  6. Face scanner is a facial recognition that confirms individual identity using their face.
  7. Eye scanner is an eye recognition that confirms individual identity using their eyeball.
  8. Authentication is additional code or pin used immediately after other password or passcode.
  9. Authentication is also known as 2 Factor (2FA).
  10. Information security refers to the processes and practices aimed at protecting electronic information from unauthorized access, use, disclosure, disruption, modification, or destruction.
  11. Fingerprint is a physical biometric that confirms individual identity using their thumb while authentication is an additional code or pin used after a password or passcode to confirm identity.
  12. The functions of information security are: fostering a culture of empowerment and improvement, increasing accountability, demonstrating consistent information security, prioritizing information assets and processes, identifying and prioritizing risks, improving security capacity and capability, guaranteeing good governance and organization engagement, preserving the integrity of data, making data available for authorized users, and enhancing best practice.

Lesson Presentation

Introduction (5 minutes)

  • Introduce the topic of information security and explain why it is important
  • Discuss the purpose of the lesson and what students will learn

Body (45 minutes)

  1. Cultivating a Culture of Empowerment and Improvement (10 minutes)
  • Explain what this function means and why it is important
  • Discuss how it helps build a culture of security within an organization
  1. Improving Accountability (10 minutes)
  • Explain how information security helps increase accountability for data protection and management
  • Discuss the importance of knowing who has access to sensitive data and why
  1. Maintaining Consistent Security Standards (10 minutes)
  • Discuss the importance of having consistent security standards and processes in place
  • Explain how this function helps ensure that all employees follow the same guidelines and procedures
  1. Protecting Information Assets and Processes (10 minutes)
  • Explain the role of information security in identifying and protecting important assets and processes
  • Discuss how this helps minimize the risk of data breaches
  1. Managing Risks (5 minutes)
  • Explain the function of information security in identifying and managing risks
  • Discuss the importance of knowing what risks are present and how they can be mitigated

Conclusion (10 minutes)

  • Summarize the key functions of information security
  • Emphasize the importance of understanding how these functions work together to protect data and systems
  • Answer any remaining questions from the students

Assessment (10 minutes)

  • Pass out handouts with multiple choice questions to assess student understanding
  • Review the answers as a class and discuss any misconceptions
  • Encourage students to ask questions or provide feedback on the lesson

Weekly Assessment Answer all the questions.

  1. Information security helps to __________ accountability for data protection and management.
  2. One of the functions of information security is to __________ a culture of empowerment and improvement.
  3. Another function of information security is to __________ the integrity of data.
  4. The role of information security is to __________ and prioritize important assets and processes.
  5. Information security is crucial in __________ and managing risks.
  6. To ensure consistent security standards, information security must __________ all employees follow the same guidelines and procedures.
  7. By preserving the integrity of data, information security helps to __________ data for authorized users.
  8. Information security helps to improve __________ and capability.
  9. Good governance and organization engagement is guaranteed by __________ of information security.
  10. To enhance best practice, information security must __________ in line with the latest industry standards.