Вы находитесь на странице: 1из 3

School PANGHULO NATIONAL HIGH SCHOOL Grade Level 10

Teacher JOYCE ANN V. AMALANG - ISULAT Learning TLE – CSS


Area (Computer System Servicing)
Teaching Quarter 3rd Quarter
Grade 10 Dates and November 5 - 9, 2018
Time
Daily Lesson Log

I. OBJECTIVES
A. Content Standard The learner demonstrates understanding of the underlying concepts and principles on
configuring computer systems and networks.
B. Performance Standard The learner independently demonstrates skills in configuring computer systems and
networks as prescribed by TESDA Training Regulations.
C. Learning Competencies LO 2. Configure computer systems and networks
Learning Outcome  Enable network security to the computer systems
Learning Objectives - Identify different types of threats in network security
- Discuss how threats or security attacks affects the computers in a network
- Identify and recognize security attacks in the computer
- Suggest 3 ways to avoid computer security attacks
- Discuss in 10 minutes the security attack assigned to their group in a 10-
slide PowerPoint presentation.
LC code TLE_ICTCS10CC-Id-e-1
CONFIGURING COMPUTER SYSTEMS AND NETWORKS (CC)
II. CONTENT
Threats to Computer Security
III. LEARNING RESOURCES
A. References
1. Teacher’s Guide pages TG pages 29 & 32
2. Learner’s Material pages LM Pages 141 – 1 56
3. Textbook pages
4. Additional Material from
Learning Resource (LR) Portal
B. Other Learning Resources
IV. PROCEDURES
A. Reviewing previous lesson or Review terms in network security
presenting the new lesson.
B. Establishing a purpose for the lesson State the learning competencies/objectives
C. Presenting Examples/ instances of the Present news/video clips of major security attacks in the Philippines
new lesson

D. Discussing new concepts and Unlock terms


practicing new skills #1 1. Threats  potentials for vulnerabilities to turn into attacks on computer
systems, networks, and more.
2. Computer Security attacks - is a strike against a computer system, network, or
internet-enabled application or device.
3. Attack - is any attempt to expose, alter, disable, destroy, steal or gain
unauthorized access to or make unauthorized use of an Asset.
E. Discussing new concepts and WHAT TO KNOW:
practicing new skills #2
Security Attacks
To successfully protect computers and the network, a technician must understand both
of the following types of threats to computer security:
Physical: Events or attacks that steal, damage, or destroy such equipment as servers,
switches, and wiring.
Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal
information.
Threats to security can come from inside or outside an organization, and the level of
potential damage can vary greatly. Potential threats include the following:
Internal: Employees who have access to data, equipment, and the network. Internal
attacks can be characterized as follows:
Malicious threats are when an employee intends to cause damage.
Accidental threats are when the user damages data or equipment unintentionally.
External: Users outside an organization who do not have authorized access to the
network or resources. External attacks can be characterized as follows:
Unstructured attacks, which use available resources, such as passwords or scripts, to
gain access to and run programs designed to vandalize.
Structured attacks, which use code to access operating systems and software.
F. Developing mastery Group Activity
 Research about the types of cyber attacks/threats assigned to your group and prepare
to present it in your class
 Your slide content
 Introduction
 Example (video/news clip)
 Description (what)
 Tips how to recognize this attack
 Tips how to avoid this attack (atleast 3 tips)
 Short Quiz (5 items)
 Title | references
 members | section
 Prepare your presentation in MS PowerPoint
 Must be 6 to 10 slides only
 Presented in 5 to10 minutes only

Group | Topic
1. Pharming
2. Phishing
3. Vishing
4. Tailgating & impersonation
5. Ransomware
6. Adware & spyware
7. Spam
8. Denial of Service
9. Key loggers
10. Botnets
11. Waterhole attacks
12. Social Engineering
13. Cryptographic attacks
14. Wireless jamming
15. Hoaxes

For reference: https://www.professormesser.com/security-plus/sy0-501/sy0-501-training-


course/
https://youtu.be/f3eIERxYHhY?list=PLG49S3nxzAnnVhoAaL4B6aMFDQ8_gdxAy
G. Finding practical applications of Suggest ways/tips to protect your personal computer network and stay safe online
concepts and skills in daily living
H. Making generalizations and abstractions Complete the sentence below:
about the lesson

To protect computer network from security attacks, a technician must;


_________________________________________________________
I. Evaluating learning Scoring Rubrics (Presentation)
Qualities & Criteria Score
Format/Layout (10)
Content/Information (20)
All elements of the topics are addressed
The information is technically sound
Information based on careful research
Coherence of information
Quality of Writing (15)
Clarity and cohesiveness of sentences and paragraphs
No errors in spelling, grammar and use of English
Organization and coherence of ideas
References (5)
Soundness of references
Oral Presentation (50)
J. Additional activities for application or
remediation
V. REMARKS
VI. REFLECTION MERCURY PALLADIUM COPPER SILVER
A. No. of learners who earned 80% on the
formative assessment
B. No. of learners who require additional
activities for remediation.
C. Did the remedial lessons work? No. of
learners who have caught up with the lesson.
D. No. of learners who continue to require
remediation
E. Which of my teaching strategies worked
well? Why did these work?
F. What difficulties did I encounter which my
principal or supervisor can help me solve?
G. What innovation or localized materials did I
use/discover which I wish to share with other
teachers?

Вам также может понравиться