Методическая разработка для проведения открытого занятия
по английскому языку
по теме «Компьютерная безопасность»
“Computer security”
для студентов специальности 09.02.04 "Информационные
системы (по отраслям)".
Автор: Абрамов
Валентин Иванович
преподаватель ВоГУ
2014 г
План учебного занятия
Тема занятия: “Computer Security” («Компьютерная безопасность»)
Тип занятия: практическое занятие
Продолжительность занятия: 1 час.20 мин. (1 пара)
Междисциплинарные связи: со специальной дисциплиной
«Информационная безопасность»
Цели занятия:
Учебно-методические: активизация
лексико-тематического материала по теме «Компьютерная безопасность».
Обучающие: развитие лексических навыков
чтения и говорения; развитие навыков аудирования в коммуникативных
ситуациях профессионально-направленного общения.
сопутствующая задача- развитие умения
читать/понимать на слух с целью извлечения детальной информации, с целью поиска
нужной информации.
Познавательные: знакомство с различными
видами незаконной деятельности в Интернете, способами защиты от нее;
ознакомление со структурой и содержанием англоязычного сайта, посвященного
данной тематике.
Развивающие: развитие дедуктивного
мышления, воображения, способности к распределению и переключению внимания, к
выявлению причинно-следственных связей и извлечения информации из прочитанного.
Воспитательные: формирование осознанного
отношения к выбранной профессии, создание профессионально-направленной
мотивации изучения английского языка.
Методы работы: метод коммуникативного
обучения, словесный, наглядный, практический, объяснительно-иллюстративный,
поисково-исследовательский; самостоятельная работа и работа под руководством
преподавателя, устная проверка результативности овладения знаниями, умениями,
навыками.
Ход занятия
1. Оргмомент (2 мин.) + Фон. зарядка ( названия
комп. угроз)
|
Teacher: Hello! Glad to see you all at the lesson today! Hope
you are fine and ready to start the lesson. Our topic is “Computer security”.
We are going to:
- revise and practice the new
vocabulary we learned at our previous lesson;
- listen to the summaries(
or reports) on the texts about illegal software you prepared as a hometask;
- watch some videoclips on
the topic;
- work with
the Internet site “Online Security "
First of all, let
s train our sounds: trojan, virus, worm, spyware, scareware,
keylogger,
adware, phishing, cookies, browser highjackers, crimeware
+backdoor,
exploit, wabbits, botnet, dialer, dropper, fake AV and the most spread viruses
nowadays are considered to be Lenart,Free Love, Tchechen and the most dangerous
one is considered to be Red John
2.
Речевая разминка –
введение в тему урока с использованием статистических таблиц .
Режим
работы - фронтальный
|
Содержание
деятельности преподавателя: беседа с группой с целью введения в тему, обоснования ее
актуальности, создания заинтересованности.
|
2.1 And
now let s watch the cartoon(*1) "AV & Internet
Security" 2.2 “Warning! Spyware detected on your
computer!”
Teacher: -
Such a window can appear from time to time on the computer screen.
1 What is its
purpose? -to warn about
spyware on my computer 2 What should you do when
you see it?-I should try to delete the spyware 3 What about
your PC? Do you often see such warnings?- Yes, I do/No,I dont.
4 What kinds of computer security
threats do you know? -Viruses,worms..
5 What AV
software do you know?-
Dr. Web, Kaspersky,Avast...
6 What AV
software do you have?-
7 What AV
software is better....or....?- What is the best AV software?-
As for me, I
have Avast, Kaspersky and... in my desktops and laptops at home
And now let s
have a dialogue you were to make up at home
2.3 And
now, have a look at some data about attacks of malicious software (malware) on
the Internet (STATISTICS)
Режим работы - в группах
Teacher: - Look at the table. It shows the level of malware attacks in
different countries:
for Group 1 -
Which countries are more attacked by malware?
for Group 2 -
Which countries are less attacked?
for Group 3-
Which countries are the least attacked?
Teacher: - So, we can see, that the situation
with malware attacks in many countries of the world is very serious. Today we
will learn what damage malware brings and what security measures can be taken
against it.
3. And now let
s watch a videoclip(*2) about some of the computer threats and try to memorize
them.
What computer
threats does the video tell us about?-viruses, worms, trojans
4. I asked
you to prepare short summaries( or reports) about some of the computer threats
( 6 reports)
5 Teacher: -
So, now we know what malware can be used in the Internet. Our task is to
protect our computers and personal information . And we can do it in different
ways. So, let s get down to that kind of work and you ll get to know something
new about that, I hope. Take your places at computers over there, will you? Now
you are to find and read and interpret online security information on the site
"GetNetWise"
I give you 5or
6 minutes to do this assignment.
“How would you
rate the usefulness of this content? - 1 2 3 4 5
Саморефлексия:
самооценкa эффективности работы с сайтом:
How can you
estimate the effectiveness and practical usefulness of your work with the site:
A. I learned much new and interesting
information which can help me to protect my computer and personal information
better.
B. The information was new and interesting,
but I am not going to use it. I don’t care too much about computer security.
C. I didn’t find any new and useful
information on the site. I have known about and used all this before.
6 And now,
to summerize all this information let s watch a presentation on the topic
7 And now,
to consolidate the material we ll watch the videoclip(*3) "How To Avoid
Computer Viruses". You ll get scripts of this video for you to better
understand all that. You are to say what you should do to avoid computer
viruses.
All right,
I guess you know that I am not an expert in IT tehnologies.So now please give
me some tips on how to avoid computer viruses. What should I do to avoid
computer viruses?
-- You
should...
8 And now,
let s recall computer slang and then we ll do a test.
9 Well, I
guess you are tired already and for a change we ll watch the video
"Apple
Technologies 2050"
10 And now
I d like to tell you about your home assignment. I guess it is known to you
that our today s lesson is the last but one . So you are to get ready for your
credit test.
11 And
finally your marks for today ...
Appx: T: What
s the difference between spam & scam?
Text
"Storing Data" ( Hometask )
Оставьте свой комментарий
Авторизуйтесь, чтобы задавать вопросы.