You are on page 1of 8

FIAT LUX ACADEME

CAVITE
Columnar Lesson Plan in Empowerment Technologies
Week 2-September18-22, 2023

Subject Matter Objectives Activities Evaluation/Assessment Remarks


Introduction to Information Day 1, September 11-15, 2023
and Communication G11STEM Raffinaan
Technology M 9:00-11:00/ W 10:00-11:00/F 2:00-3:00
G11 STEM Curie
 Online safety, security M 4:10-5:10/TTHF 10:00-11:00
ethics & netiquette G11 STEM Copernicus
 Internet Risks & Internet TTH 7:00-9:00
Threats G11 Del mundo
 Contextualized Online M 7:00-8:00/TTH 9:00-10:00/T 4:10-5:10 Activity #2: Essay Writing
search and research skills. Title: Navigating the Digital
Motivation: World: Online Safety,
 DIGITAL DILLEMA CARD Security Ethics, and
Instructions: Netiquette
References: 1. The teacher has a set of digital dilemma
cards. Each card contains a brief scenario Instructions:
Empowerment Technologies related to online behavior, ethics, or
Innovative Training Works, Inc. security. For example: 1. Introduction – Begin
2019, Page 17-25. - Scenario 1: "You receive an email from your essay with an
an unknown sender with an attachment. It engaging hook that
https://www.studocu.com/ph/doc claims to be a prize you've won. What capture the reader’s
ument/eastern-visayas-state- should you do?” attention. Provide a brief
university/secodary-education/ 2. The class will be divided into small overview of what the
module-1-lesson-2-online-safety- groups or pairs, depending on the class size. essay will cover.
security-and-netiquette/23643299 3. Distribute a set of digital dilemma cards 2. Understanding Online
to each group. Make sure each group has a Safety – Explain the
mix of scenarios. concept of online safety.
4. Instruct the groups to read and discuss Discuss the risks
the scenarios on their cards. They should associated with sharing
consider: personal information
- What are the potential risks or ethical online, including cyber
concerns in the scenario? bullying, identity theft,
- What actions should be taken to address and online scams.
these concerns? Provide real-life
- How can proper online etiquette be examples to illustrate the
maintained? importance of being
5. Encourage groups to come up with cautious online.
creative and practical solutions to the 3. Personal Experiences -
dilemmas. Share relevant case
6. After a designated discussion time, have studies or personal
each group share one scenario with its experiences related to
corresponding discussion and solutions. online safety, security
Each group have to ACT each scenario with ethics, or netiquette.
solutions that they have to come up. Describe how individuals
have faced online
Lesson Proper: challenges and how they
 Analyze and evaluate resolved them or learned
online securitty risks  Ask the Difference between Web from them.
such as various 1.0, 2.0 and Web 3.0. 4. Conclusion - Summarize
online threats,  Discuss the Online Safety and the key points of your
phishing emails, Security. essay and restate the
distinguish between  Information that we are providing. importance of online
legitimate and  Giving tips on how to stay safe safety, security ethics,
potentially harmful online. and netiquette.
online content.  Discuss what are the Internet Encourage your readers
Threats and Internet Risks. to practice responsible
Insights digital citizenship and
make the internet a safer
 Develop empathy Online safety, security, ethics & etiquette and more respectful
and ethical The internet is the guiding technology of place.
awareness through the Information Technology Age just as the
class discussion and electrical engine was of the Industrial Age.
activitied, student
will explore the In these times, more and more people are
emotional impact of already engaged in the use of technology. Criteria Score
cyberbullying on These people who are raised in a digital, Creativity 5
individuals and media-saturated world are called digital Content 15
society. natives.
Ideas 10
‘Organization’
 The internet is very powerful tool.
TOTAL 30
 Apply their  It can be used to promote business.
knowledge of online  It also source of entertainment
safety by setting up a through games, movies, online
secure online profile. communities etc.
 The internet is also one of the most GROUP ACTIVITY #1:
dangerous places, especially if you
do not know what are you doing In groups, create multimedia
with it. presentations (using tools
like PowerPoint or Google
Slides):
“HOW SAFE ARE YOU?”
Web Technology Timeline:
Information & Risks Research and create a
timeline of web technologies
1. First Name that have emerged from the
 There is a risk in sharing your first Web 1.0 era to Web 2.0.
name. Chances are, a hacker may Include details about how
already know plenty of stuff about these technologies have
you even if you only give out your shaped the internet.
first name. Likewise, you cannot
just walk in a room and start Interactive Multimedia
introducing yourself to everyone. Presentation:
You do not know whom you can Incorporate videos,
come across with. animations, and interactive
2. Last Name elements. Each group can
 If sharing your first name is a focus on a specific aspect of
small risk, having both your first Web 1.0 and Web 2.0.
and last is riskier. You will be
vulnerable to being searched for
Criteria Score
using search engines, which Content 25
include image search. Matching Visual 15
a name with a face is modus to Presentation
several cybercrimes like identity Interactivity 5
theft. Presentation 5
3. Middle Name skills
TOTAL 50
 Sharing your middle name alone is
probably not the riskiest of this
shared information, but sharing
your füll name would be.
4. Current and previous school (s)
 Most of people who steal identities
study their subject. They can use
this information for verification
purposes.
5. Cellphone Number
 Your cellphone number should
never be posted on the internet. The
internet is a public place. It is the
same as posting your number on a
billboard. You would not want
random strangers to text or call
you, or worse, pretend that they are
someone else.
6. Names of your Parents
 Risky yet not as risky as posting
their full names, especially your
mother’s maiden name. In fact, you
may have already encountered
many websites that require your
mother’s maiden name as an
answer to a secret question
whenever you lose your password.
7. Name of your Sibling
 Disclosing this is a huge risk.
Strangers may pretend or use their
identity to dupe you.
8. Address
 Hopefully, you answered “no” to
this one. Giving the internet your
number is one thing; giving them
your address is a whole other level.
It would be much easier for
criminals to find you.
9. Home Phone Number
 This shared information is riskier
than sharing your personal phone
number. Scams usually use this
information to deceive you, one of
which is when a stranger pretends
to know your parents or pretends to
be you.
10. Birthday
 Letting people know your birthday
is probably a must if you want to
get as many gifts as possible. But
having it in your profile makes you
vulnerable to identity theft.

The internet is defined as the information


superhighway. This means that anyone has
access to this highway. This is why social
networking sites like facebook continue to
improve their security features. The threat
cybercrime is very real! Please be careful.

TIPS TO STAY SAFE ONLINE


1. Be mindful of what you share
online.
2. Do not just accept terms and
conditions; read them.
3. Check out he privacy policy page
of a website to learn how the
website handles the information
you share.
4. Know the security features of the
social networking site you use.
5. Do not share any of your password
with anyone.
6. Avoid Logging in to public
networks (wifi, browsing incognito
etc.)
7. Do not talk to strangers whether
online or face to face.
8. Never post anything about a future
vacation. It is similar to posting,
“rob my house at this date”.
9. Add friends you know in real life
and refrain from adding strangers.
10. Avoid visiting untrusted website.

INTERNET RISKS

Cyberbullying
 It happens when someone
intentionally abused, harass, and
mistreated by other person using
electronic communication.
Identity Theft
 It is a crime of stealing personal
information for the purpose of
assuming that person's name or
identity to make any form of
transactions.
Cyberstalking
 A criminal practice where
electronic communication is used
to stalk or harass individual or
group.
Sexting
 The act of sending sexually explicit
text messages, images, and videos.

INTERNET THREATS

Malware - also known as Malicious


Software.
Types of Malwares
 Virus - a malicious program that
replicate itself by copying itself to
another program.
 Trojan Horse - a malicious
program that disguised as
legitimate program that user will
accept and use but take control of
your computer.
 Worm - malicious program that
copy's itself and spreads to other
computers.
 Spyware - A malicious program
that gathers information from
victim's computer and send it back
to the hacker.
 Adware - An unwanted
advertisement that will pop-up
several times on victim's computer
then behave abnormally and
tedious to close them.
 6. Keylogger - A program that runs
in the background and steals user
credentials and confidential
information and send back to hack
by recording every keystroke that a
user makes on their computer or
device.
 7. Botnet - A collection of
infected internet-connected devices
such as PC and mobile phone that
are controlled by a common type of
malware.

You might also like