There is a lesson plan about network security 1 1. Activity objectives:
1. Cognitive goal: to understand the relationship between computers, networks and middle school students' access to information;
2. Emotional goal: treat the network correctly, not indulge in it, and consciously resist the adverse effects of the network;
3. Behavior goal: to show the colorful online life and practical achievements of middle school students in the new era.
Second, the activity content:
1. Show students' online achievements: With the help of online support and large-screen demonstration, show students' colorful online life and practical achievements.
2. Put forward many negative events, and fully understand the network by discussing the negative effects of the network, so as to lay the foundation for the following discussion on correctly understanding and using the network.
3. Establish a correct network view: on the basis of full argumentation and discussion, understand the network objectively and fairly.
4. Discuss the maintenance of network order: establish the concept of "everyone is responsible for maintaining network order" and put forward some effective concrete measures.
Third, preparation before class:
1. Collect and sort out class electronic graphic information, and establish class photo albums, ppt presentations, e-learning assistants, etc.
2. Collect reports on the negative effects of computers and networks, and sort out the data.
3. Technical support: a multimedia demonstration classroom, a blackboard and several audience seats.
Fourth, the activity process:
(A) the network is not far away, just beside you and me-the charm display of online gathering.
1, record every wonderful moment-level electronic photo album display
Make a book of photos by scanning or digital photography, including:
(1) Personal photos and a motto that each student is most satisfied with, photos and messages of each teacher;
(2) Commemorative photos of major group activities, such as military training, sports meeting and spring outing.
2. One person has "difficulty" (the "difficulty" of "difficult problem"), and all parties support it-e-learning assistant.
Summarize the situation of the class from moral, intellectual and physical aspects. In the form of word document and ppt demonstration, the key points and difficulties of each subject are summarized.
3. Let me swim in the ocean of knowledge-on-site network resource search
The audience put forward the knowledge points that need to be queried and searched.
(b) In the virtual world, I don't distinguish between east, west, north and south-I realize the negative nature of the network.
The discussion mainly focused on the following aspects:
1. It's not that I don't want to go, but I really can't stop —— A discussion on indulging in online games.
2. Give me back my bright eyes and healthy body-a discussion about damaging my health.
3. Who am I and who are you in the virtual world? -The discussion about online dating, online rumors and online cheating is essentially a discussion about online morality and responsibility.
While the audience is discussing, use multimedia to play the audio-visual information collected by the audience on the big screen. All the discussion contents are sorted out by the host and summarized on the demonstration blackboard.
(3) Whose fault is it, the Internet or me? -Discuss the advantages and disadvantages of the network.
Moderator: What has the Internet brought? Why do some people go to success and glory because of it, and some people go to degradation and destruction because of it? This leads to the discussion of the nature of the network. The moderator grasps the discussion trends and summarizes the discussion results. A student with fast computer input speed will input the discussion results into the machine and display them on the big screen.
The discussion focused on:
1, the network is good: the network is a medium, a means, a tool and a bridge for us to communicate with the outside world. There is no right or wrong in itself.
2. In the virtual world, we are still realistic: although the network is a virtual world completely different from real life, it is still inseparable from realistic morality and norms.
3. Before the Internet, everyone was equal: the Internet provided everyone with equal resources, and it was up to you to gain or suffer.
Carry out network rules to the end —— Discussion on maintaining network order.
Network order, starting from me; Network order is everyone's responsibility. Facing the network, we should do the following:
1, improve their own quality and resist the temptation of the network;
2. If bad information is found, notify friends to boycott and report to relevant departments.
Verb (abbreviation of verb) The class teacher speaks.
Through the exchange of classmates, it seems that the network is really worthy of attention. Many networks have penetrated into every aspect of our lives, but whether it will become a gurgling source of wisdom or a Pandora's box "given" by God to mankind varies from person to person. Therefore, students should correctly understand the network and consciously resist the temptation. Moreover, our school also stipulates that students are strictly forbidden to surf the Internet from Monday to Friday, so please consciously abide by it.
Sixth, the end of the activity
There are two teaching objectives about network security:
1, let students know what network information security is, and let students know the general measures to maintain information system security.
2. Understand what information security threats exist in the network, what consequences they will bring, and how to effectively protect your information.
3. Cultivate students' safe use of network information technology and enhance their awareness of information security.
Teaching focus:
Understand the common factors of threat information.
Learn the basic measures of virus protection and information security protection
Teaching difficulties:
1, learn the basic measures of virus protection and information security protection.
2, the safe use of information technology in daily life.
Teaching process:
1, scenario import: the serious consequences caused by computer viruses and computer hackers.
Broadcast news and video materials related to computer viruses, hacking and crimes.
Make students realize the destructive effect of virus and the seriousness of information technology security.
2. The theme of "information security" is introduced.
Teachers and students discuss and explain topics together: (information security: ensuring the integrity, availability, confidentiality and controllability of information);
3, ask questions, students answer, teachers give directions:
Through the demonstration just now, let's think about the following questions:
Turn on the computer and suddenly find that the stored files are lost or the system suddenly crashes. Do you know what happened in the computer?
What should you do when you see spam flooding your e-mail, or when you open an e-mail, anti-virus software prompts that your computer is infected with a virus?
One day, a friend saw some folders in your computer on his machine. What does this mean?
One day, a friend told you that he knew your online account and password. Can you believe it?
What do you think of the news you receive online? Just remit a certain amount of money to an account and you will get a grand prize.
One day, you were chatting on QQ, and a stranger sent you a website. Can you open it?
Internet is an ocean of information. Will you believe all the information here and all the "net people"?
Do you know how many "leak doors" there are on the Internet? As far as you know, can you tell me how these secrets were leaked?
Combined with students' daily application of computers, after discussion, students have a preliminary understanding of viruses, hackers, spam, network sharing and computer crimes. Every student has enhanced the awareness that information security is related to each of us.
4. Master the "biggest culprit" computer virus that threatens information security (group discussion)
(1) Definition:
Computer virus is a set of computer instructions or program codes that are compiled or inserted into computer programs artificially, which destroys computer functions or data, affects the use of computers, and can replicate itself.
(2) Features: Latency, infectivity, concealment and destructiveness.
(3) Transmission channels: There are many transmission channels, mainly through networks and disks.
5. Do a good job in information security protection. The teacher summed up how to establish correct network behavior:
Install genuine anti-virus software and firewall, upgrade from time to time, and comprehensively kill the virus on the system;
Patch the computer system and make irregular backups of important data;
Don't log on to unhealthy websites, don't receive websites of unknown origin, and don't download programs and data from the Internet at will.
Do not manufacture, use and spread computer viruses and hacker attack software;
Abide by relevant national laws and regulations, and don't do anything illegal.
6. Divide the students into 7 groups, with 6 people in each group, and talk about their own experience and how to establish correct network civilized behavior for themselves.
7. Course summary
In this lesson, we learned several types of information security threats in the network. I hope that through this lesson, students can improve their awareness of information security, use the convenience provided by the network correctly, and always pay attention to the importance of information security.
8. Homework after class:
Learn the National Youth Network Civilization Conference.
Inquire about the method of accessing the Internet safely.