1 Teaching objectives in kindergarten network security education;
1, let students know what network information security is, and let students know the general measures to maintain information system security.
2. Understand what information security threats exist in the network, what consequences they will bring, and how to effectively protect your information.
3. Cultivate students' safe use of network information technology and enhance their awareness of information security.
Teaching focus:
Understand the common factors of threat information.
Learn the basic measures of virus protection and information security protection
Teaching difficulties:
1, learn the basic measures of virus protection and information security protection.
2, the safe use of information technology in daily life.
Teaching process:
1, scenario import: the serious consequences caused by computer viruses and computer hackers.
Broadcast news and video materials related to computer viruses, hacking and crimes.
Make students realize the destructive effect of virus and the seriousness of information technology security.
2. The theme of "information security" is introduced.
Teachers and students discuss and explain topics together: (information security: ensuring the integrity, availability, confidentiality and controllability of information);
3, ask questions, students answer, teachers give directions:
Through the demonstration just now, let's think about the following questions:
Turn on the computer and suddenly find that the stored files are lost or the system suddenly crashes. Do you know what happened in the computer?
What should you do when you see spam flooding your e-mail, or when you open an e-mail, anti-virus software prompts that your computer is infected with a virus?
One day, a friend saw some folders in your computer on his machine. What does this mean?
One day, a friend told you that he knew your online account and password. Can you believe it?
What do you think of the news you receive online? Just remit a certain amount of money to an account and you will get a grand prize.
One day, you were chatting on QQ, and a stranger sent you a website. Can you open it?
Internet is an ocean of information. Will you believe all the information and all the "net people" here?
Do you know how many "leak doors" there are on the Internet? As far as you know, can you tell me how these secrets were leaked?
Combined with students' daily application of computers, after discussion, students have a preliminary understanding of viruses, hackers, spam, network sharing and computer crimes. Every student has enhanced the awareness that information security is related to each of us.
4. Master the "biggest culprit" computer virus that threatens information security (group discussion)
(1) Definition:
Computer virus is a set of computer instructions or program codes that are compiled or inserted into computer programs artificially, which destroys computer functions or data, affects the use of computers, and can replicate itself.
(2) Features: Latency, infectivity, concealment and destructiveness.
(3) Transmission channels: There are many transmission channels, mainly through networks and disks.
5. Do a good job in information security protection. The teacher summed up how to establish correct network behavior:
Install genuine anti-virus software and firewall, upgrade from time to time, and comprehensively kill the virus on the system;
Patch the computer system and make irregular backups of important data;
Don't log on to unhealthy websites, don't receive websites of unknown origin, and don't download programs and data from the Internet at will.
Do not manufacture, use and spread computer viruses and hacker attack software;
Abide by relevant national laws and regulations, and don't do anything illegal.
6. Divide the students into 7 groups, with 6 people in each group, and talk about their own experience and how to establish correct network civilized behavior for themselves.
7. Course summary
In this lesson, we learned several types of information security threats in the network. I hope that through this lesson, students can improve their awareness of information security, use the convenience provided by the network correctly, and always pay attention to the importance of information security.
8. Homework after class:
Learn the National Youth Network Civilization Conference.
Inquire about the method of accessing the Internet safely.
Kindergarten Cyber Security Theme Education Teaching Plan 2 Activity Purpose
1, network security as one of the school safety education, through the class meeting, let the students obsessed with online games deeply understand the harm of the network, adjust their mentality, and guide them to study for the senior high school entrance examination.
2. In view of students' love and fascination with computer games, I want to guide them correctly and guide them to master the games.
3. Let students realize that as a qualified middle school student, in today's network era, we should make good use of network resources to study and improve our own quality.
Activity form:
Class meeting activities
Activity process
First of all, the introduction.
Teacher: Students, the theme of our class meeting today is network. With the development of science and technology, the network is becoming more and more important around us and closer to people's lives. Thinking: What's on the Internet? What does it bring us?
Second, talk about the network.
The positive influence of Internet on teenagers;
1. The Internet provides a new channel for teenagers to get all kinds of information. Obtaining information is the first purpose of teenagers surfing the Internet, and many questions that are difficult to say at school can also be answered satisfactorily online. The huge information capacity of the Internet meets the needs of teenagers to the greatest extent and provides them with the richest information resources.
2. Broaden teenagers' global vision, broaden their political vision and knowledge, thus contributing to the formation of their global consciousness. By surfing the internet, they can cultivate their ability to communicate with all kinds of people; By reading all kinds of useful books online, I can improve my cultural literacy.
3. Internet helps to innovate the means and methods of ideological education for teenagers. Using the network to carry out moral education, educators can communicate with teenagers with their true mentality without scruple, which provides a new shortcut for moral educators to discover and understand teenagers' thoughts, conduct positive guidance and all-round communication. In addition, teenagers can maintain rapid interaction with multiple educators or educational information at the same time, so as to increase the frequency of ideological interaction, make offline appointments and get together, and realize the nourishment and supplement of online moral education, so as to resolve conflicts in time, warm people's hearts, mobilize enthusiasm and stimulate creativity.
Third, online dating.
Do you make friends online? What do you think of the role of netizens?
In case one, an English major in a university in Nanjing, whose net name is Sha, was deeply attracted by Bi Dongdong's "online image" of Yichun City, who had rich experience in chatting, and was killed when they met for the third time. I met my boyfriend three times and was killed.
In the second case, a girl and a man got pregnant twice in three months, and then the man disappeared.
Kindergarten network security theme education teaching plan 3;
1. Understand students' awareness and level of network security.
2. Let students grasp the concept of network as a whole and have a general understanding.
Teaching process:
Introduction before class: With the advent of the information age, more and more people can't live, work and study without computer networks, and various network security issues also follow. Some people use the internet to work and study, but there are always some people who destroy the internet to make money and show their computer skills, which greatly affects their normal work. Through the study of this course, I hope that students will have a general understanding of network security, and have a detailed grasp of Trojan horse detection, hacking techniques, computer network viruses, vulnerability inspection and prevention. Through the combination of theory and practice, including the use of some commonly used security software, students can systematically learn the relevant knowledge of network security under the guidance of teachers.
I. Learning requirements and methods
1. There is no suitable textbook for this course. I hope you can often take notes and do a good job in listening and reviewing with online teaching plans.
2. In addition to listening carefully in class, this course relies more on everyone's consciousness, consulting relevant learning materials through various channels, and taking notes with more hands and brains in order to solve similar problems in the future.
3. Conduct some exchanges and discussions in a timely manner to share your benefits for a period of time.
Second, the network security overview
1, students discuss in groups to understand students' understanding, interest and mastery of network security.
Divide the two groups of students into 10 minutes to discuss Trojan horse and the "panda burning incense" virus that has recently become popular on the Internet, and then choose a representative from each group to speak. The teacher made a summary according to the situation.
2. The teacher got a more accurate understanding of Trojan horse and "panda burning incense" virus by summing up.
Trojan horse: Trojan horse program is a popular virus file at present. Unlike ordinary viruses, it does not copy itself or intentionally infect other files. It attracts users to download and execute by disguising itself, and provides Trojan horse breeders with the entrance to open the seed computer, so that horse breeders can destroy and steal the seed files at will, and even remotely control the seed computer.
"Panda Burning Incense" virus: At the end of 2006, a large-scale outbreak of "Panda Burning Incense" virus and its variants occurred on the Internet in China. The virus spread in many ways, and all the infected program files were changed to look like a panda with three incense sticks. At the same time, the virus also has the function of stealing users' game accounts and QQ accounts.
This is a super virus, and the infected computer will attach the virus to all web files on the hard disk. If the infected computer is a website editor, it may be attached to all pages of the website through a poisoned webpage virus, and netizens will be infected with the virus when visiting the poisoned website. "Panda Burning Incense" has infected portal websites such as Tianya Community. "Panda Burning Incense" not only has all the characteristics of the virus, but also has a strong commercial purpose: it can secretly steal users' game accounts and QQ accounts for sale, and can also control infected computers, turn them into "cyber zombies" and secretly visit some websites that pay for their access, thus making profits. Some varieties also contain pilfer date trojan.
The concept of network security: information security refers to protecting the confidentiality, integrity and availability of information, that is, data-oriented security. After the emergence of the Internet, in addition to the above concepts, the connotation of information security has been extended to user-oriented security. Generally speaking, network security includes six threats: physical security threats, operating system security flaws, network protocol security flaws, application software implementation flaws, user use flaws and malicious programs.
Third, examples of network security
Security vulnerabilities Theoretically speaking, security vulnerabilities are unexpected functional branches in software. Through security holes, software can do unexpected things for software designers.
1. Example: Alipay control was originally designed to encrypt communication and protect users' communication security, but it can also be used to perform any function, such as running a Trojan horse that steals bank accounts. If a Trojan horse wants to run on a user's computer, one of the main means is to exploit security vulnerabilities. At present, the most widely used are various IE control vulnerabilities. On February 8, 2007, Alipay upgraded the controls and fixed the above vulnerabilities. As long as the vulnerable controls are installed, whether you use Alipay or log in to Alipay, you will be threatened by vulnerabilities. Because any web page can call this control by placing special code. However, using Alipay service itself is not dangerous-because Alipay website itself does not contain such malicious code.
2. How to prevent Trojans and viruses?
At present, the main working principle of all anti-virus software is based on feature recognition. What is feature recognition? Generally speaking, it is to master the roster of bad guys and look for them according to the roster. If this virus or Trojan horse is just written, there is no "criminal record" and it is not on the roster, anti-virus software will not recognize it. Although some anti-virus software also has some advanced identification functions that do not depend on the roster, this function is not reliable. What's more, today's virus Trojan authors, after writing the program, will test it with anti-virus software to confirm that it will not be detected before releasing it. So antivirus software is useless? No, all kinds of antivirus software can help you solve most of your troubles, but you can't expect it to be reliable.
Fourth, understand hackers.
Hacking is an industry that only a few people can enter. Every hacker has cruel youth. Most people are interested in computer assembly language in the first and second years of middle school or university. Later, they have to spend a lot of time on basic learning, so that they can enter the advanced road of hackers. Most people can't overcome this challenge and choose to give up. Hacking is also an industry that only young people can engage in. Among the hackers in China, the older generation who call themselves old people are only 30 years old, while the new generation may be less than 20 years old.
Trojan horse technology is a common attack method for hackers. It hides a program that will run when Windows starts in your computer system, and adopts the server/client running mode, so as to control your computer when surfing the Internet. Hackers use it to steal your password, browse your drive, modify your files, log in to the registry and so on.
In addition, hackers often use system vulnerabilities to carry out some destructive attacks. These will be studied slowly with everyone in the future teaching.
Verb (abbreviation of verb) abstract
This lesson mainly gives students an overall understanding of network security through examples around them. In the future, they will learn more about hackers, Trojans, security vulnerabilities and computer viruses. I hope everyone will cooperate well and lay a good foundation for future work and study!
The teaching objectives of kindergarten network security theme education teaching plan 4;
1. Knowledge and skills Objective: Ask students to understand the necessity of using the Internet safely. By letting students experience the analysis process of cases around them, students can understand the harm of Internet addiction, be familiar with the characteristics and prevention methods of Internet addiction, and cultivate their ability of discovery, induction, application awareness, problem-solving and innovation.
2. Process and method goal: As a teacher, we should not only teach students the knowledge of information technology, but more importantly, teach students the methods, ideas and consciousness of mastering information technology. In the process of experiencing case analysis activities, we are full of exploration and creativity, and gain successful experience and joy in the activities, and establish self-confidence to overcome difficulties.
3. Emotional attitude goal: to cultivate students' ability to explore unknown knowledge and learn independently. Cultivate students' ability of judgment, discrimination and prevention.
Teaching emphases and difficulties:
Key points: let students know the harm of internet addiction and learn to use the network correctly. Difficulties: Correct use of several methods to quit Internet addiction.
Teaching process:
First, create situations and introduce new lessons.
Introduce Na Ying's song "Looking at Flowers in the Fog" into the topic of this lesson. "Looking at the flowers in the fog and the moon in the water can tell that things are unpredictable." Do you know any bad temptations around us? The lure of the Internet, the lure of money, the lure of pornography and drugs, the lure of cults.
"Lend me a pair of discerning eyes, so that I can see this disturbance clearly and clearly." Excuse me: Na Ying wants to see the world clearly with a pair of discerning eyes, so can we recognize the harm of the network with discerning eyes and resolutely refuse them?
Take the songs that students are familiar with as the natural introduction of this lesson. )
Second, cooperate and exchange, and explore new knowledge.
By looking at some cases of Internet addiction, we can understand the characteristics of Internet addiction.
Material 1: Xiaojie, with excellent grades, cares about the group, is attracted by the network, addicted to the network, and his academic performance drops. Later, in order to go online, he embarked on the road of robbery.
Material 2: According to Xinhua News Agency, in recent years, teenagers have accounted for more than 60% of the total number of criminal offenders in China, and the juvenile crime rate has increased year by year. At present, there are more than 654.38 million juvenile offenders serving their sentences in reform-through-labour institutions, and many more are serving their sentences in reform-through-labour institutions. Guangzhou Haizhu District Detention Center has six juvenile cells, holding 77 minors. Among them, 30% students are addicted to playing "computer" and indulging in "drugs" to induce crimes.
Material 3: On June 1 2004, a sixth-grade elementary school girl in Sasebo City, Nagasaki Prefecture had a quarrel with her classmates because of online chat, and then she killed the arguing classmate at school with a knife, which caused an uproar in Japan. Parents find that many primary and middle school students spend a lot of time chatting on the Internet after returning home. Primary and secondary school students often chat with their classmates. If chatting with strangers is unpleasant, you can ignore each other, but quarreling with classmates on the Internet will lead to real contradictions. Because we can't meet each other online, it's easy to deepen the contradiction. Once the contradiction intensifies, it may lead to tragedy.
Third, observe the characteristics and explore deeply.
According to the characteristics of Internet addiction, the in-depth exploration and profound understanding of the harm of Internet addiction are mainly reflected in the following five aspects:
1, damaging the body and affecting health.
2, psychological damage, personality alienation.
3, breeding right and wrong, disrupting public order.
4. Affect your studies and delay your life.
5, security risks, life-threatening.
Fourth, analyze examples and deepen new knowledge.
Legend has it that there was a channel witch in ancient Greece. She lured all the passing ships with her own songs and let them hit the rocks and sink. The wise and brave captain Odyssey bravely accepted the task of crossing the English Channel. In order to resist the witch's singing, he thought of a way: let the crew tie themselves tightly to the mast, so that even if he heard the singing, he could not command the sailors; And let all the crew plug their ears so that they can't hear the witch's singing. As a result, the ship successfully crossed the channel.
Excuse me:
1. How did Captain Odyssey get the ship through the channel smoothly?
2. From this example, can you find out the conditions needed to consciously resist bad temptations? Xiao Ming 13 years old, a junior one student in a school. He is clever by nature, and his character and knowledge are excellent. Last year, he won the first prize in the computer network knowledge competition for primary and middle school students in the province. Since he was addicted to online games in the Internet cafe, he went to the Internet cafe every day after school. By the weekend, he was even more unscrupulous. He stays in the Internet cafe all day and sometimes stays up all night with his classmates. He was fascinated.
Excuse me: Do you have a good way to save Xiaoming?
Through an ancient Greek fairy tale and a case about Xiaoming's classmate, let the students discuss the problem in groups, so as to get some ways to quit Internet addiction. (Students speak freely and cultivate the ability of language expression and generalization)
Fifth, talk about the harvest and summarize.
According to the students' discussion results, the teacher summed up some practical and good ways to quit Internet addiction: First, take cognitive therapy to make Internet addicts quit Internet addiction firmly.
(1) Help internet addicts correctly understand the network, point out the advantages and disadvantages of the network, let the treated people learn to distinguish what is beneficial to them, and use the network to expand their knowledge and do occasional relaxation and entertainment.
(2) Help Internet addicts have self-knowledge.
(3) Work out life plans with internet addicts to help them find their ideals and goals and enhance their sense of responsibility and mission.
The therapeutic effect of this treatment stage is to make internet addicts realize the harm of internet addiction ideologically, take the initiative to quit, and enter the next treatment stage after the addicts are willing to actively cooperate with the treatment. The second step is to adopt the method of systematic desensitization, so that internet addicts can gradually quit internet addiction, and therapists and internet addicts can jointly formulate a plan to quit internet addiction. Details are as follows:
(1) Internet time plan. Gradually reduce the online time within a month, and finally achieve occasional online or offline.
(2) Start the reward mechanism and give appropriate stimulation. Internet addicts can go ahead as planned, so parents are advised to give rewards (using token system), that is, appropriate tokens are issued every week and converted into cash at the end of the month. If you can't do it, you will be punished, but you can't fight or scold.
(3) Parents are advised to install some learning software and games beneficial to physical and mental health, make some software with their children, guide children to visit some good educational websites, and encourage children to communicate with classmates, teachers, relatives and friends by sending and receiving emails.
The effect to be achieved at this stage is to make the life and rest of internet addicts return to normal and basically get rid of internet addiction.
The third step is to adopt alternative therapy to make internet addicts really quit internet addiction.
Through the above two stages of treatment, if Internet addicts no longer spend a lot of time surfing the Internet, they should be helped to develop entertainment projects to replace the Internet, release the pressure of study and meet their spiritual needs. Specific suggestions are as follows:
(1) Cultivate children's healthy hobbies, and take part in painting, model airplane and music with their consent.
(2) To meet the full spiritual life and entertainment needs of teenagers, we can arrange some outdoor sports such as swimming and ball games according to the children's own preferences after studying, so that children can study with rest.
(3) Intentionally let children participate in some social activities, establish friendship with peers, go to a movie, a sports competition or organize an outing after studying.
The effect to be achieved at this stage is: let internet addicts feel the colorful life outside the network and transfer patients' excessive attention to the network. Let the subject really quit Internet addiction, and let the network become an ordinary thing in life like other learning tools and daily necessities. In addition, to completely eradicate Internet addiction syndrome, we should also pay attention to the following points:
1, improve students' ability to resist temptation.
2. Educate students to adjust their mentality.
Schools and families should make joint efforts in education.