Current location - Music Encyclopedia - Dating - 5 teaching plans for the theme class meeting of National Cyber Security Publicity Week in primary and secondary schools.
5 teaching plans for the theme class meeting of National Cyber Security Publicity Week in primary and secondary schools.
# Lesson Plan # Introduction With the advent of the information age, more and more people can't live without the computer network in their daily study, work and life, which is followed by various network security issues. I have prepared the following contents for you, hoping to help you.

1. Teaching plan for the theme class meeting of National Cyber Security Publicity Week in primary and secondary schools

I. Design Background Computers and networks have become indispensable tools in our work, study and life. However, more and more middle school students are addicted to the Internet. We can often see shocking news that middle school students are addicted to the internet, stay out at night, commit crimes due to internet addiction, and even self-harm. Internet addiction has seriously endangered students' physical and mental health development and family happiness. When we are trying to help students prevent Internet addiction, should we remind students to pay attention to their words and deeds to prevent being cheated on the Internet? "Reject Internet addiction and surf the Internet safely" is the theme we are going to discuss today!

This class adopts the WEB teaching platform in the teaching process, and the location is set in the student computer room. The purpose is to demonstrate an idea that when the society develops continuously and students study in the classroom, they may reach the learning state of one person and one computer. Then how to carry out teaching work? Can we use computers to complete traditional paper tests, discussions and homework, and share teachers' teaching plans on the Internet so that students can study before and after class?

Second, the teaching objectives

1, let students know whether they have the tendency of internet addiction through the internet addiction self-test questions.

2. Through data and case analysis, let students know about Internet addiction and its harm.

3. Learn how to surf the Internet healthily and safely.

Third, the teaching process

1, Introduction: Internet addiction self-test.

2. Understand Internet addiction and reject it.

(1) What is Internet addiction?

(2) The harm of Internet addiction

3. Secure Internet access

(1) Be careful when making friends online.

(2) It is a crime to "hack" other people's computers.

(3) Anti-trap of online trading

(4) It is also illegal to spread rumors on the Internet.

4. Summary

(1) Discussion voting

(2) Summary

2. Teaching plan for the theme class meeting of National Cyber Security Publicity Week in primary and secondary schools

First, the theme of the class meeting: improve the awareness of network security and make rational use of network resources.

Second, the class meeting objectives:

1. Improve college students' three network-related abilities: the ability to identify network security risks, the ability to use network resources correctly, and the self-control ability to use the network reasonably.

2. Establish a network concept: the network is a learning resource for college students, not just an entertainment tool. Guide college students to use the network as their own learning tool, be the master of the network, make rich network resources for their own use, and improve their self-competitiveness.

Third, the class meeting background:

At the beginning of the new semester, my freshman has become a sophomore. They have basically adapted to college life and are making progress in their professional study, campus life and social practice. In order to facilitate self-study and life, many students were equipped with computers in their sophomore year, and the internet was also opened in the dormitory. The network provides great convenience for students' online course study, extracurricular entertainment activities, college students' on-campus network communication, online shopping and the use of network resources. However, we also see that online use is a double-edged sword, and many students fall into a wrong path in online dating, online shopping and online games. Some friends were hurt emotionally and even physically, some were addicted to games, abandoned their studies and had to drop out of school, some were cheated by online shopping and suffered economic losses. It can be said that while the network presents a beautiful picture for our college students, there are also stormy waves all over the reefs. Some sophomores are not alert enough, and their discrimination ability is not high, so they are easy to lose themselves in the network and fall into crisis. Through the presentation of the theme class meeting, students' ability to identify network security risks should be improved, network resources should be used correctly, and network self-control ability should be used reasonably, so that the network can really serve students' growth.

Fourth, the class meeting time:

Need to decide or solve

Verb (abbreviation of verb) Class meeting place:

Need to decide or solve

Six, class meeting object:

All students

Seven. Preparatory work:

1. Survey of students' network usage.

2. Collect text and video materials about network security and network insecurity cases.

3. Please arrange a sketch about network security for the whole class.

4. Assign the related work of each class committee.

Eight. Activity flow:

1. The class organizing committee organizes students to be present and sign in on time.

2. Please enjoy the sketch, make clear the theme of the class meeting through the sketch, and the host announces the official start of the class meeting.

3. On-the-spot investigation on the use of students' network and the problems encountered during the use.

4. Show pictures and videos about the safety of network use, and ask the students to talk about their feelings after watching them.

5. Combined with the list of cases, this paper introduces in detail all kinds of security risks that college students may encounter in the process of using the network, such as careless friends, improper online shopping, online game addiction, false network language and a series of consequences, so that students can form a comprehensive, clear and profound understanding of network security and improve their ability to distinguish network security.

6. Combining the study and life of college students, show the advantages of the network, such as free online course resources, online resources of school libraries, and employment resource websites for college students. And form the ability to use network resources correctly.

7. Ask relevant students to come forward and introduce their experience in network security education. The host pointed out that the network is only a way to enrich our study and life, and we should not rely too much on and indulge in the network. It is necessary to encourage students to exercise more in real life, improve their self-control over the use of the Internet, and truly make the Internet a booster for college students' study and a good helper for their lives.

8. The counselor concluded that students are required to re-recognize the advantages and disadvantages of the network, pay attention to the hidden dangers in the use of the network, make the network their own learning tool, be the master of the network, make rich network resources for their own use, and improve their self-competitiveness.

Nine, class meeting summary:

1. When using network resources, students must be vigilant and learn to identify various hidden dangers in the network.

2. Facing the complexity of network resources, it is more important to learn how to make rational use of them. The class can set up a network center group to help students identify the authenticity, eliminate the dross and improve the network security factor.

3. Teaching plan for the theme class meeting of National Cyber Security Publicity Week in primary and secondary schools

Teaching objective: 1. Let students realize that the network has both positive and negative aspects.

2. Let students enhance their resistance to bad content on the Internet.

3. Treat the Internet correctly and be a healthy and sunny youth.

Teaching focus:

Let students have a correct attitude towards the Internet and use it correctly.

Teaching difficulties:

Improve network self-control and let students surf the internet moderately.

Teaching methods:

Teaching method, discussion method and speech method.

Teaching time:

1 class hour

According to the data provided by China Youth Network Association, at present, the proportion of primary school students, junior high school students and senior high school students surfing the Internet is 25.8%, 30% and 56% respectively. Internet addiction teenagers account for about 13.2% of the total number of young netizens in China, and middle school students aged from 13 to 17 have become "the hardest hit areas for internet addiction". The Internet, a "double-edged sword", is mercilessly devouring the physical and mental health of teenagers. Truancy, running away from home, robbery and even sudden death in internet cafes, and taking the road to crime have occurred from time to time.

First, understand Internet addiction and refuse Internet addiction

What is Internet addiction?

"Internet addiction" can be described as Internet addiction syndrome. That is, they are indifferent to real life, but addicted to virtual online games, love and information. It is a behavioral process and the end point of behavioral development. Psychology believes that Internet addiction is a mental illness; Psychological teachers believe that Internet addiction is a psychological problem of normal people (except for special cases). Internet addiction can be divided into internet communication addiction, online game addiction, online information addiction and online gambling addiction.

2. The harm of Internet addiction

After teenagers suffer from internet addiction, they are only mentally dependent at first, and then they develop into physical dependence. Long-term addiction to the Internet will lead to depression, decreased vision, muscle strain in shoulder and back, disordered sleep rhythm, loss of appetite, indigestion and decreased immune function. When you stop surfing the Internet, you will suffer from insomnia, headache, inattention, indigestion, nausea, anorexia and weight loss. Because of being online for a long time, the brain is highly excited, which leads to a series of complex physiological changes, especially autonomic nervous dysfunction and decreased immune function, which leads to cardiovascular diseases, anxiety and depression. Teenagers are in a critical period of physical development, and the emergence of these problems will have a great impact on their physical health and growth. The most direct harm to teenagers with internet addiction is that they can't concentrate in class, can't finish their homework on time, lose their confidence and interest in learning, and even skip classes and drop out of school. All kinds of unhealthy content in the network will also cause teenagers to indulge themselves too much, making their legal and moral views weak and their outlook on life and values distorted. Teenagers with internet addiction spend all their tuition and living expenses, lose their personality and self-esteem, beg for money, cheat their parents at home, even develop into theft and robbery, and finally embark on the road of illegal crimes.

Two, early prevention, establish a correct network awareness.

Children infected with internet addiction are mostly children with poor self-control, inner incomprehension and boredom with learning. For them, we must let them get rid of bad habits, don't pay attention to grades, and more importantly, we must educate them in an all-round way, understand, support and encourage them, and make them sunny, cheerful and confident. This is the premise.

1. Help children understand the virtuality and concealment of the network.

As we all know, at home, as long as there is a network cable, or even no network cable, we can easily talk to people all over the world, but you never know his real situation. Teenagers have no social experience and are easily deceived. Therefore, parents should make it clear that the network is virtual, tell their children the skills to identify online fraud, and let them establish a correct concept of surfing the Internet.

2. Limit the time and content of surfing the Internet.

It's best for children to surf the Internet for 2 hours every day, which can help them make a timetable, do more exercise, and don't always be in front of the computer, which is bad for their health. Also, children's online content must be monitored. We can install some software to take regular screenshots, or check the browser browsing history. , keep abreast of children's use of the Internet, and guide children's browsing content to news, learning and other aspects. If children are young, parents will accompany them to surf the Internet.

Step 3 communicate with children

Communicate and chat with children often, let children talk about their troubles and open their hearts, especially introverted children, to gain the understanding of their parents, and don't let them use the Internet as the object of communication and venting their emotions. Don't be lonely in children's hearts, learn to listen to children.

4. Prevent children from surfing the Internet in Internet cafes.

News reports of various accidents in Internet cafes are also common. The environment there, the people who surf the Internet, and the content people browse on the Internet will all have various adverse effects on children. So children can't go to internet cafes wherever they go online. Otherwise, under the influence of the internet cafe environment, their growth will definitely be unfavorable, and they may be infected with internet addiction. And after a visit, it is more likely that there will be a second and third visit. ...

Once you are infected with internet addiction, you must quit it in time.

When children are addicted to the internet, we need to unite teachers, pay attention to children's dynamics, avoid continuing to go to internet cafes, explain its harm, and help them establish a correct outlook on life and values. This also needs to mobilize the whole society and the government to protect the rights enjoyed by minors. But as parents, we need to care for our children, let them have love in their hearts, attach importance to their moral education, and let them understand their life value orientation.

4. Teaching plan for the theme class meeting of National Cyber Security Publicity Week in primary and secondary schools

First, the background of the class meeting Computer network is a network connected by computers all over the world. Each computer can be connected to any other computer, and it can also provide services for one or more other computers. In this network, various information resources are more and more abundant for everyone to share.

So what is the main purpose of computer network? Its main function is browsing, that is, finding what we need and inquiring what we are interested in among many exquisite multimedia information. Now, the computer network has become another world as colorful as the real world. We can also communicate with each other on the computer network, such as chatting, leaving messages and writing letters. The rapidity and convenience of computer network are loved by most people, and are more and more accepted and used by people. One day it will be as popular as electricity.

However, our classmates simplify and magic the function of computer network, and immerse themselves in electronic online games or online dating every day. I didn't eat, sleep or study, so I became an out-and-out Internet addict. In view of this situation, it is necessary to guide students to correctly understand the computer network.

Second, the purpose of the class meeting

1, correctly understand the computer network.

2. Understand the network.

3. Use the Internet.

4. Learn self-control and learn to live.

Third, the class meeting preparation

1, rehearse entertainment programs such as song and dance sketches in groups.

2. Each student should write two compositions, one is "the network in my eyes" and the other is "the network of tomorrow".

Fourth, the class meeting process

A program

1, hownet "What can software do?" And "what can the network do?"

2. Play the sketch "Networm Zhang San"

3. Recognize the true face of the network: the network that makes me happy and the network that makes me sad.

4. Imagine the future of the Internet.

5, the whole class chorus "China Eva", the class meeting is over.

B activity record

Understand the network "What can software do?" And "what can the network do?"

Moderator's talk: As middle school students who are at the forefront of the times, we are no strangers to computer networks. However, what is the magic of computer network, what benefits it can bring to us and how to use today's network? In this class meeting, we will lead you into the network, and together we will unveil the mystery of computer network.

First, let's talk about two parts. One is "What can software do?" First, "What can the network do?"

1. What can software do?

We all know that the current software is very powerful. As far as educational software is concerned, anything can be done as long as there is input. And this investment, from a macro point of view, the return is very high and completely feasible.

2. What can the network already do?

With the establishment and popularization of various broadband networks in China, the advantages of online education, such as real-time interaction, student autonomy and massive information, have been presented. Online Q&A, audio and video, is simply a national lecture.

The first advantage of online education is massive information. On the Internet, there will be more and more websites with theme content, and the content will be more and more abundant. The latest knowledge and information are spread on the Internet, and the updating of knowledge is going on all the time. What is fashionable today may be out of date tomorrow. Today's theoretical high-rise buildings may be blown into garbage ruins by the results of practice tomorrow.

The second advantage of online education is students' autonomy. For college and middle school students with learning initiative, it is an unspeakable pain to follow the teacher step by step. According to the needs of teaching, it is a great pleasure to let them search in the ocean of information. Positive and negative information, through comparison and discussion, is sorted into a system, which is a process of entropy reduction and very pleasant.

The third advantage of online education is real-time interactivity. The use of stand-alone CD-ROM learning, the lack of direct communication with teachers, students are not sure, special problems can not be solved in time. The establishment of broadband network has created the possibility for real-time communication. For example, on-the-job students studying medicine can get timely guidance from teachers when operating on patients.

Verb (abbreviation of verb) class meeting summary

5. Teaching plan for the theme class meeting of National Cyber Security Publicity Week in primary and secondary schools

1. The purpose of the activity is to make full use of effective forms such as theme class meetings and classrooms, widely publicize and popularize laws, regulations, policies and related knowledge of network security education throughout the school, and strengthen the awareness of participation and responsibility of teachers and students in network security education.

After this activity, students have a new understanding of network security education. Know how to use the Internet, how to surf the Internet in a civilized and healthy way, especially some students who are addicted to mobile online games, are well aware of the harm of Internet addiction, and have repeatedly said that they should get rid of their dependence on mobile phones and networks and surf the Internet in a healthy and safe way. The majority of teachers and students have mastered the basic knowledge of network security, laid a solid foundation for healthy and civilized Internet access, improved their awareness of self-protection, achieved the predetermined goal and achieved good results.

Second, the main content

(A) the harm of teenagers indulging in the Internet

1. seriously affects normal learning.

Wasting time cannot guarantee study time. Nowadays, the task of learning culture is very heavy, and it is difficult to improve academic performance without sufficient time. Lack of energy, after indulging in online games, there is no spirit in class the next day, the teacher is free from spirit when giving lectures, the class effect cannot be guaranteed, and there is no energy in learning. After being distracted and addicted to online games, the scene of the game is thrilling and will be deeply imprinted in my mind. Even if I am in class, my heart will fly to the middle of the game.

2. The exhaustion of willpower and the decline of self-control ability

The overuse of the Internet makes teenagers have a strong dependence on the Internet. Especially the adventure in online games, the ease in online dating, the fresh temptation in unhealthy online content, etc. , so that teenagers gradually become "internet addicts", but they lose interest in their main life-learning, lack perseverance, decline in self-control, and neglect their studies.

3. The formation of "network personality" and the decline of physical quality.

The characteristics of network personality are "loneliness, nervousness, fear, indifference and non-socialization".

Attachment to the online virtual world, man-machine dialogue and computer-mediated communication easily alienate people's personality from the real society, and teenagers are in a period of vigorous growth and development. The radiation and high tension of staying in front of the computer for a long time will damage various functions of the human body and lead to the decline of physical quality.

4. Distrust of people around you and tense interpersonal relationships

In the virtual world of the Internet, everyone appears as a false identity. Although many times you can boldly express your true thoughts or say what you want to say without scruple, under the false identity, there is little truth in online interpersonal relationships, which is always full of distrust and interpersonal tension. Especially for "introverted" teenagers, the network provides them with a platform to show themselves, but it also makes them more introverted and self-enclosed offline.

5. Values are vague and moral values are weakened.

Adolescence is the formation period of outlook on life and values, with strong curiosity and weak self-control, which is easily influenced by alienation. Network is not only a treasure house of information, but also a dump of information. All kinds of information are mixed, all-encompassing: novel, rebellious and interesting, especially the propaganda tone and cultural trend of thought in western developed countries, which can easily make teenagers' outlook on life and values tilt and blur.

6. Cybersecurity risks and cybercrime.

The Internet has aroused the safety anxiety of teenagers. Due to the immature physical and mental development of teenagers, their ability to distinguish right from wrong is poor, and their awareness of self-protection is not strong, which is easy to cause online privacy loss and online fraud. Once met, they are often frightened and at a loss.

(b) Methods to prevent virus or Trojan attacks

1. Install anti-virus software on the computer, scan the system regularly and kill viruses;

2. Update virus database and system patch in time;

3. Download the software as far as possible to official website or a large software download website, and carry out anti-virus before installing or opening software or files of unknown origin;

4. Don't open links to unknown web pages at will, especially links to bad websites. When strangers send links to themselves through QQ, try not to open them;

5. Don't casually receive files sent by strangers when using network communication tools. If you receive it, you can cancel the "Hide extensions of known file types" function to view the file types;

6. Strengthen the authority management of public disk space and regularly kill viruses;

7. Check with anti-virus software before opening the mobile storage, and you can create a folder named autorun.inf in the mobile storage (which can prevent the U disk virus from starting);

8. When it is necessary to download data from public networks such as the Internet and transmit it to intranet computers, data can be transmitted by burning CDs;

9. Set passwords for all accounts in the computer system, and delete or disable expired accounts in time;

10. Back up regularly, and it can be quickly repaired after being seriously damaged by viruses.

(3) Ways to prevent the accounts of social platforms such as QQ, WeChat and Weibo from being stolen.

1. Try not to have the same account and password. Modify the password regularly to increase the complexity of the password. Don't directly use the number of personal information such as birthday, telephone number and ID number as the password.

2. The password should be composed of uppercase and lowercase letters, numbers and other characters as far as possible, and the length of the password should be appropriately increased and changed frequently;

3. Different network applications need to set different user names and passwords;

4. Restart the machine before using the computer in the Internet cafe, and be wary of being peeked when entering the account password; In order to prevent the account from being intercepted, you can enter some account names and passwords first, and then enter the remaining account names and passwords;

When it comes to online transactions, we should pay attention to the confirmation with the transaction object by phone.

(4) Precautions for safe use of e-mail

1. Don't click on links, pictures and files in unknown emails at will;

2. When using the email address as the user name to register the website, you should set a website password different from the original email login password;

3. If there is an initial password, the password should be modified;

4. Set the password retrieval prompt question appropriately;

5. Be vigilant when receiving emails related to personal information and money (such as winning prizes and raising funds).