Week 1 | T&L Activities: K1.1 The role and types of preventative business control techniques in protecting the digital security of an organisation: The Role of Preventative ControlsPreventative controls are proactive security measures that aim to stop threats or incidents before they happen. They are designed to reduce risks by blocking unauthorised access, preventing breaches, and maintaining system integrity. In business environments, these controls help protect:
Types of Preventative Control TechniquesPreventative controls fall into four main categories: Physical, Combined, Administrative, and Technical. Physical Preventative ControlsThese controls protect physical access to devices, servers, buildings, and data centres.
Combined (Managed Access) ControlsThese combine physical and digital control methods to regulate who can access what and when.
Administrative Controls (Policies and Procedures)These are organisational rules and practices that enforce secure behaviour.
These controls are often documented in Acceptable Use Policies (AUPs) and Security Procedures. Technical ControlsThese are software or system-based controls used to prevent cyber threats.
Design a Secure Office
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 2 | T&L Activities:K1.2 The role and types of detective business control techniques in protecting the digital security of an organisation:
The Role of Detective ControlsDetective controls are security measures that aim to identify and alert an organisation to suspicious or harmful activity.
These controls don’t stop the incident from occurring – instead, they help organisations:
Types of Detective Control TechniquesDetective controls can be physical or administrative in nature. Physical Detective ControlsThese help identify unauthorised physical access or unusual movement in secured spaces.
These tools are especially important for data centres, server rooms, or any area storing critical digital infrastructure. Administrative (Policies and Procedures)These are human- or system-based logs and checks designed to detect abnormal activity.
Spot the Detective Controls
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 3 | T&L Activities:K1.3 The role and types of corrective business control techniques in protecting the digital security of an organisation:
The Role of Corrective ControlsCorrective controls are reactive security measures. They are used after an incident has occurred to:
They help an organisation recover quickly and learn from incidents so improvements can be made. Types of Corrective Control TechniquesCorrective controls can be grouped into physical and administrative techniques. Physical Corrective ControlsThese help reduce damage from physical threats such as fire, smoke, or environmental hazards.
These systems limit physical damage to IT infrastructure, allowing quicker recovery. Administrative Corrective Controls (Policies and Procedures)These are planned response actions documented in company policies. They guide staff on what to do after an incident to reduce harm and avoid repetition.
These procedures help ensure safe, consistent, and quick responses.
Create a Fire Response Plan for a Server Room
Group Presentation - What an I Study Guide
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 4 | T&L Activities:K1.4 The role and types of deterrent business control techniques in protecting the digital security of an organisation:
Deterrent controls are pre-emptive security measures that are designed to discourage or dissuade people from attempting to carry out harmful or unauthorised actions. Rather than stopping or detecting threats directly, deterrents work by:
Think of deterrents as the organisation saying: Types of Deterrent Control TechniquesDeterrent controls can be physical or administrative. Physical Deterrent ControlsThese create a visible presence that discourages unauthorised access or behaviour.
These make people think twice before trying anything malicious, such as breaking in or tampering with equipment. Administrative Deterrent Controls (Policies and Procedures)These are organisational rules and formal expectations that discourage inappropriate or risky behaviour.
These controls create awareness and define clear consequences, which can discourage risky or harmful actions.
Design a Deterrent Plan for a School Computer Room
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 5 | T&L Activities: K1.5 The role and types of directive business control techniques in protecting the digital security of an organisation: Directive controls are guidance-based measures that aim to influence and shape behaviour in a way that supports good security practices across an organisation. They help promote a security-focused business culture by:
These controls are about leading by example and building awareness rather than stopping threats directly. 📣 Types of Directive Control TechniquesDirective controls come in two main types: physical and administrative. Physical Directive ControlsThese are visible and practical tools that communicate or enforce expectations in a physical space.
These measures set the tone for secure behaviour and remind people what is expected. Administrative Directive Controls (Policies and Procedures)These are formal rules, procedures, and training activities designed to guide behaviour and establish a consistent security culture.
These controls make sure everyone knows their responsibilities, understands the risks, and is trained to act appropriately.
Build a Security-Aware Workplace Culture
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
Many of these control techniques don’t apply to just one job role, they involve many IT professionals working together.
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 6 | T&L Activities:K1.6 The role and types of compensating business control techniques in protecting the digital security of an organisation:Compensating controls are backup or alternative security measures that are put in place when a primary (main) control fails, is unavailable, or isn’t fully effective. They act as a safety net to maintain security if the original control:
These controls do not replace the original control, but reduce the risk until the primary control can be restored. ðŸ›¡ï¸ Types of Compensating Control TechniquesCompensating controls can be physical or administrative. Physical Compensating ControlsThese are environmental or infrastructure-related measures that support the continuity of systems, especially in the event of failure.
Administrative Compensating Controls (Policies and Procedures)These help guide people on how to react or adapt when the usual security controls are not available.
These policies ensure staff know how to maintain safety and security when the standard systems aren’t working correctly.
Backup Security Plan – When the Main Control Fails
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 7 | T&L Activities: K1.7 The role and implementation of a disaster recovery plan in protecting the digital security of an organisation: A Disaster Recovery Plan (DRP) is a formal set of procedures and controls used by an organisation to recover and restore IT services after a disaster such as:
The main role of a DRP is to:
It is usually supported by a broader Business Continuity Plan (BCP), which outlines how the whole organisation continues to function during and after a crisis. ðŸ› ï¸ Components of a Disaster Recovery PlanDRP controls can be both physical and administrative in nature. Physical ComponentsThese refer to infrastructure and hardware-based protections to help restore operations.
These ensure that even if the main system is destroyed or damaged, data and services can be restored from another location. Administrative Components (Policies and Procedures)These are organisational strategies and tasks that ensure services are restored efficiently and securely.
These policies ensure a coordinated response and help maintain control over resources during recovery. Build a Disaster Recovery Plan for a Small Business
"Part 1 - Those that fail to plan, plan to fail"
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 8 | T&L Activities:K1.8 How a disaster recovery plan (DRP) works:A Disaster Recovery Plan (DRP) is a documented process that outlines how an organisation will recover its IT services and data following a disruption such as a cyber attack, fire, flood, hardware failure or power outage. The goal of a DRP is to:
How a Disaster Recovery Plan WorksA DRP is built step-by-step to ensure it’s thorough, effective, and ready to be used when needed. Below is the full process: Define the Scope of the PlanBefore writing a DRP, the organisation must define what areas the plan will cover.
This step ensures nothing important is missed in the recovery plan. Gather Relevant InformationTo create a useful DRP, the organisation needs to collect essential data about its systems and past issues.
Having the right people and tools listed makes the response much faster and more accurate. Risk AssessmentA DRP must be based on a proper risk assessment to understand what needs to be protected and how.
This step helps prioritise what should be restored first in the event of a disaster. Creating the DRPWith the scope, information, and risks identified, the actual plan is developed. Key Elements to Include:
The plan should be written clearly so anyone on the IT team can follow it in an emergency. Plan ApprovalOnce the plan is created, it must be formally approved.
Approval ensures that the plan is trusted, understood, and adopted by the wider organisation. Testing the DRPThe plan must be tested regularly to ensure it works in practice. Testing Steps:
Testing ensures the plan remains current and effective as systems, staff, and threats change. Continuous ImprovementAfter testing, the plan should continue to evolve through ongoing reviews.
Continuous improvement ensures the plan is always ready when needed – not just written and forgotten.
"Part 2 - Those that fail to plan, plan to fail"
Class discussion: Tutor led discussion exploring types of impacts that can occur within an organisation as a result of threats and vulnerabilities, including:
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 9 | T&L Activities:K1.9 The types of impacts that can occur within an organisation as a result of threats and vulnerabilitiesWhen organisations face threats (e.g. cyberattacks, natural disasters, insider threats) or vulnerabilities (e.g. weak passwords, unpatched software, poor access control), the impacts can be serious and wide-ranging. Below are the main types of impacts, with examples and explanations. Danger to Life🔠Impact: Breaches in health and safety policies can result in injury or even death, especially when IT systems are involved in critical areas such as healthcare, manufacturing, or security. 🧾 Example:
📌 Key Point: IT systems increasingly control physical systems—when they fail, human life can be put at risk. Privacy ImpactImpact: Confidential and personal data can be exposed through data breaches, leaks, or unauthorised access. Example:
Includes:
Property and ResourcesImpact: Attacks or errors can cause physical damage to equipment or IT resources, or make systems inaccessible. Example:
Can include:
Economic ImpactImpact: Organisations can face financial losses from system downtime, ransom demands, fraud, or lost business. Example:
Consequences include:
Reputational ImpactImpact: Security incidents can damage trust in the business, affecting how customers, partners, and the public view the organisation. Example:
Effects:
Legal ImpactImpact: Failing to meet legal responsibilities (e.g. GDPR, health and safety laws) can lead to prosecution, fines, or other penalties. Example:
Covers:
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 10 | T&L Activities:K1.10 The potential vulnerabilities in critical systems:A vulnerability is a weakness in a system that can be exploited by a threat actor (such as a hacker) or caused by human error, poor design, or lack of security controls. In critical systems—such as servers, network infrastructure, and secure workstations—vulnerabilities can lead to data loss, downtime, and serious security breaches. Below are some of the key vulnerabilities found in organisations. Unauthorised Access to Network InfrastructureWhat it is: When people (inside or outside the organisation) gain unauthorised access to core components like switches, routers, firewalls, or servers. Why it’s a risk:
Example:
Mitigation:
Unauthorised Physical Access to Network PortsWhat it is: When someone physically connects a device (e.g. laptop or USB stick) to network ports without permission. Why it’s a risk:
Example:
Mitigation:
Single Point of FailureWhat it is: A single component (like a server or router) that, if it fails, causes the entire system or service to stop working. Why it’s a risk:
Example:
Mitigation:
System FailureWhat it is: A system crash or malfunction caused by hardware issues, software bugs, or poor maintenance. Why it’s a risk:
Example:
Mitigation:
Open Port AccessWhat it is: When input/output ports on devices (e.g. USB, CD drives, or wireless) are unrestricted, allowing for unauthorised data transfer or malware infection. Why it’s a risk:
Includes:
Mitigation:
Secure the Network – Spot the Vulnerability
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 11 | T&L Activities:K1.11 The impact of measures and procedures that are put in place to mitigate threats and vulnerabilities:
Organisations face cybersecurity threats and technical vulnerabilities that can lead to serious problems like downtime, data loss, financial damage, and reputational harm. To reduce these risks, businesses put in place measures (performance targets) and procedures (operational processes) that help manage and recover from incidents. These tools help ensure the organisation stays secure, responsive, and resilient. Measures to Mitigate ThreatsRecovery Time Objective (RTO)Definition: Impact:
🧾 Example: If the RTO for the customer order system is 2 hours, the business must restore that system within 2 hours to avoid disruption. Recovery Point Objective (RPO)Definition: Impact:
Example: If the RPO is 15 minutes, data must be backed up at least every 15 minutes to avoid unacceptable loss. Mean Time Between Failure (MTBF)Definition: Impact:
Example: If a hard drive has an MTBF of 50,000 hours, it is expected to work reliably for that period before likely failing. Mean Time to Repair (MTTR)Definition: Impact:
Example: If the MTTR for the web server is 30 minutes, then any failures should typically be resolved within that timeframe. Procedures to Mitigate ThreatsStandard Operating Procedure (SOP)Definition:
SOPs ensure consistency, reliability, and compliance across the organisation. Service Level Agreement (SLA)Definition:
SLAs help ensure that IT services meet business needs and that providers are held to agreed standards. Security by the Numbers
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 12 | T&L Activities:K1.12 The process of risk management:Risk management is the process of identifying, assessing, and controlling risks that could affect an organisation’s information systems, people, assets, or business operations. The purpose is to reduce the chance of something bad happening or reduce the impact if it does. The Risk Management ProcessRisk management follows a step-by-step process to ensure risks are understood, prioritised, and addressed effectively. IdentificationWhat it is: Spotting possible risks, threats, or vulnerabilities that could harm the organisation. Examples:
This step creates a list of potential issues that need to be monitored or controlled. ProbabilityWhat it is: Estimating how likely each risk is to occur. Categories often used:
Example: This step helps identify the most urgent risks to focus on. ImpactWhat it is: Evaluating how much damage the risk could cause to systems, data, reputation, finances, or people. Factors to consider:
Example: Impact is often measured as:
PrioritisationWhat it is: Using both probability and impact to determine which risks should be dealt with first. A risk with high probability and high impact is a top priority. Includes:
Example: MitigationWhat it is: Putting in place measures or controls to reduce the probability of the risk occurring or the impact if it does. Types of mitigation:
Example:
Mitigation is ongoing – risks must be monitored and controls updated regularly.
Example Risk Matrix with RAG Ratings🔴 Red – High Risk → Immediate action required 🟠Amber – Medium Risk → Plan to control or reduce risk 🟢 Green – Low Risk → Monitor regularly Risk Scoring Grid
Example Risk Entries Using the Matrix
Review and Reflect
Manage the Risk
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 13 | T&L Activities:K1.13 Approaches and tools for the analysis of threats and vulnerabilities:To protect digital systems effectively, organisations must analyse the threats and vulnerabilities they face. This helps them decide what to prioritise, what action to take, and how much risk is acceptable. There are two main approaches to risk analysis and a range of tools used to support each one. Risk Analysis ApproachesQualitative Risk Analysis – Non-numerical ApproachThis method focuses on describing risks and ranking them based on expert judgement, opinion, and relative severity rather than numbers. How it works:
Example: If a risk could seriously damage reputation but is unlikely, it may still be rated Amber due to the high impact. Used when:
Quantitative Risk Analysis – Numerical ApproachThis approach uses numbers, data, and formulas to calculate the cost, likelihood, and effect of risks. It gives more precise information for financial or technical decisions. How it works:
Example: “If a cyberattack has a 25% chance per year of causing £40,000 in damage, the annual expected loss is £10,000.” Used when:
Tools for Threat and Vulnerability AnalysisBelow is a breakdown of key tools used in both qualitative and quantitative approaches.
Part 1Approaches to Analysing Threats and Vulnerabilities Part 2 Approaches to Analysing Threats and Vulnerabilities
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 14 | T&L Activities:K1.14 Factors involved in threat assessment for the mitigation of threats and vulnerabilities:Threat assessment involves analysing all the possible internal and external risks that may affect an organisation’s information systems. By identifying the type, source, and impact of threats, organisations can plan how to prevent or reduce them (mitigation). These factors fall into four main categories: Environmental ThreatsEnvironmental threats are natural or environmental conditions that can damage or disrupt IT operations.
Mitigation Example: Install temperature and humidity sensors; keep servers in a climate-controlled room. Manmade ThreatsInternal (from inside the organisation)
Mitigation: Role-based access control, staff training, clear acceptable use policies. External (from outside the organisation)
Mitigation: Firewalls, antivirus, regular risk assessments of suppliers, staff awareness training. Technological ThreatsTechnology Failures & Faults (Infrastructure)
Device Failures (e.g. Laptops, Desktops, Servers)
System Failures
Mitigation Across All: Regular updates, health checks, backups, robust IT maintenance schedules. Impact of Technical Change
Mitigation: Change management processes, testing before deployment, rollback plans. Political Threats
Mitigation: Stay updated on regulations, consult legal experts, adjust policies accordingly.
In a Flash - Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 15 | T&L Activities: K1.15 The purpose of risk assessment in a digital infrastructure context: • purpose: o to identify and reduce risk by: â–ª implementing Health and Safety Executive (HSE) guidelines to projects (for example installing a new uninterruptible power supply (UPS) system into a server room and identifying risks to the installers) â–ª investigating risks within the project environment (for example undertaking a PESTLE analysis) â–ª internal and external risk identification (for example implementing a supply chain assessment) â–ª quantification of impact on asset value (for example financial loss as a result of downtime)
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 16 | T&L Activities:K1.16 Types of risk response within a digital infrastructure context:When risks are identified in a digital infrastructure (e.g. networks, servers, software systems), organisations must decide how to respond. The chosen response depends on the severity, probability, cost, and business impact of the risk. There are four common types of risk response: Accept the RiskDefinition: The organisation chooses to do nothing about the risk because:
Example in Digital Infrastructure:
Key Point: You must still monitor the risk, even if it’s accepted. Avoid the RiskDefinition: The organisation eliminates the risk entirely by changing plans, tools, or actions. Example in Digital Infrastructure:
Key Point: Avoiding risk usually means changing the original scope, technology, or method of a project. Mitigate the RiskDefinition: The organisation reduces the chance of the risk happening or minimises the impact if it does. Example in Digital Infrastructure:
Key Point: Mitigation uses controls, policies, or systems to lower the level of risk. Transfer the RiskDefinition: The organisation passes the responsibility for the risk to a third party (usually through a contract). Example in Digital Infrastructure:
Key Point: Risk is not removed—it’s just handled by someone else, often at a cost.
What is the purpose of a risk assessment and how does it identify and reduces risks through HSE guidelines and different responses to risks:
Research health and safety at work guidelines and create a poster that could be used in the workplace.
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 17 | T&L Activities:K1.17 The process of penetration testing within digital infrastructure:Penetration testing is carried out in 5 key phases, each with a specific purpose and outcome: Planning and ReconnaissanceWhat it is: This phase defines the scope and goals of the test and gathers information to understand the target system. Key Activities:
Example: The tester finds out which software versions are being used on the company’s web server. ScanningWhat it is: The tester uses tools to scan systems for weaknesses and understand how they respond to different inputs. Types of Scanning:
Example: Running a port scanner (like Nmap) to see which ports are open and what services are running on them. Gaining AccessWhat it is: This is the active phase of trying to exploit identified vulnerabilities to gain access to the system. Techniques:
Example: Exploiting a weak admin login form to access sensitive data. Maintaining AccessWhat it is: Once access is gained, the tester checks if they can stay inside the system undetected or move deeper. Purpose: To understand how long an attacker could remain without being noticed, and how much damage they could cause. Example: Using a known vulnerability to create a user account with admin rights for future access. Analysis and WAF ConfigurationWhat it is: This is the final phase, where results are analysed and reported to the organisation. Findings are used to strengthen defences. Key Actions:
Example: The report shows SQL injection was possible – the WAF is updated to block similar patterns in input forms. Pen Testing Example Table
Plan Your Own Penetration Test Using any of the tools found on Pen Test tools website explore any website for its vulnerabilitieshttps://pentest-tools.com/
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 18 | T&L Activities:K1.18 The considerations in the design of a risk mitigation strategy:A risk mitigation strategy outlines how an organisation plans to reduce or control risks to its digital systems and services. To be effective, it must be carefully designed with several key factors in mind. Risk ResponseYou must first decide the type of response for each identified risk. This forms the foundation of the mitigation strategy.
User ProfileConsider the users involved in or affected by the mitigation plan. Different users have different needs and ability levels.
Make sure security measures (e.g. password policies, multi-factor authentication) are appropriate and accessible for the intended users. Cost and BenefitAnalyse the cost of mitigation against the potential impact of the risk. This helps justify whether it’s worth implementing.
Use cost-benefit analysis to support decision-making. Assign an Owner of the RiskEach risk should have a clearly defined risk owner – the person or team responsible for:
| Example | A network administrator is assigned as the owner of the risk of firewall misconfiguration. | This adds accountability and ensures the risk isn’t ignored. Escalation to the Appropriate AuthorityIf a risk becomes too severe or cannot be resolved at a lower level, it should be escalated to management or another senior decision-maker. | Example | A system vulnerability cannot be patched without budget approval, so it’s escalated to the IT Director. | Escalation ensures critical decisions are made by those with the correct authority. Planning ContingenciesDevelop backup plans in case mitigation fails or the risk becomes reality. This includes:
| Example | If the primary server fails, a contingency plan switches operations to a cloud-based backup server. | Contingency planning reduces downtime and disruption. Monitoring and Reviewing ProcessOnce a risk mitigation strategy is in place, it must be monitored and reviewed regularly to ensure it still works and is up to date.
Threats evolve – risk strategies must adapt too.
Design a Risk Mitigation Strategy Scenario: Task: Class discussion on encryption as a risk mitigation technique, including different types of encryption, including data at rest and in transit. Back it up, pack it in, let me begin
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 19 | T&L Activities:K1.19 The purpose of technical security controls as risk mitigation techniques and their applications to business risks within a digital infrastructure context:Technical security controls are automated or configured defences put in place to prevent, detect, or respond to cyber threats. They are essential in mitigating business risks within any digital infrastructure. Technical Security Controls and Their ApplicationsCyber Essentials – 5 Core ControlsCyber Essentials is a government-backed certification scheme in the UK that outlines five key technical controls that help protect organisations from common cyber attacks.
Additional Technical Security ControlsThese extend beyond Cyber Essentials and provide deeper protection within larger or more complex digital infrastructures. Device Hardening
Segmentation
Hardware Protection
Multi-Factor Authentication (MFA)
Remote Monitoring and Management (RMM)
Vulnerability Scanning
Match the Control Discuss the relationship between organisational policies and procedures and risk mitigation. Explore different policies that might be developed to alleviate risk, such as BYOD, password policy and software usage. Also, explore HSE policies, such as lone working, manual handling or fire safety. Consider how these are monitored and checked for compliance.
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 20 | T&L Activities:K1.20 The purpose and types of encryption as a risk mitigation technique and their applications:The purpose of encryption is to store and transfer data securely using cryptography techniques, so that it cannot be read or accessed by unauthorised users. Encryption helps protect:
What Is Encryption?Encryption is the process of converting readable data (plaintext) into a scrambled, unreadable format (ciphertext), which can only be turned back into readable data (decrypted) using a special key. Types of Encryption and Their ApplicationsAsymmetric EncryptionUses two different keys: a public key to encrypt and a private key to decrypt.
Useful for secure sharing over untrusted networks. Symmetric EncryptionUses one shared key to encrypt and decrypt data.
Faster than asymmetric encryption but requires secure key sharing. Data at Rest EncryptionProtects stored data (e.g. on hard drives or USBs) so that even if the device is stolen, the data is unreadable. Full Disk Encryption
Hardware Security Module (HSM)
Trusted Platform Module (TPM)
Data in Transit EncryptionProtects moving data (e.g. between computers or over the internet) from being intercepted. Secure Sockets Layer (SSL) (older but still known)
Transport Layer Security (TLS) (SSL’s modern replacement)
TLS is more secure and widely used than SSL.
Encryption Explorer
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 21 | T&L Activities:K1.21 The purpose, criteria and types of back-up involved in risk mitigation:
Back-ups help organisations recover quickly and continue operating with minimal disruption. Back-Up CriteriaWhen designing a back-up strategy, organisations must consider the following key criteria:
The more frequent and reliable the back-up, the less data the organisation will lose in a disaster. Types of Back-UpOrganisations use different types of back-up depending on how much data they have, how often it changes, and how fast they need to recover. Full Back-Up
Best for weekly back-ups or before big changes. Incremental Back-Up
✅ Good for daily/hourly back-ups where storage space is limited. Differential Back-Up
Balances speed and space — often used mid-week between full back-ups. Mirror Back-Up
Ideal for systems that require near-zero downtime (e.g. financial services). Example ScenarioA college IT department backs up student data as follows:
This layered strategy balances storage, recovery speed, and security.
Design a Back-Up Strategy
Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Maths:
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Stretch and Challenge:
|
E&D / BV | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Homework / Extension:
|
ILT | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
→ | → | → | → | → | → | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Week 22 | T&L Activities:K1.22 The relationship between organisational policies and procedures and risk mitigation:
|
Procedure Area | Risk Mitigated | Example |
---|---|---|
Network Usage and Control | Prevents slowdowns or malicious traffic | Monitor bandwidth, detect unusual behaviour |
Internet Usage | Stops access to harmful or distracting websites | Block social media or unverified download sites |
Bring Your Own Device (BYOD) | Reduces risk of infection or data leaks from personal devices | Enforce antivirus installation on personal phones |
Working from Home (WFH) | Ensures secure and safe home setups | DSE assessments, VPN access |
Password Renewal | Protects against long-term password compromise | Require password updates every 60 days |
Software Usage | Ensures only secure and up-to-date apps are used | Disallow unauthorised software, enforce updates |
Impact: These policies reduce digital threats by limiting how systems are accessed and used.
Protects staff from physical harm and reduces business liability. It also ensures compliance with health and safety laws.
Procedure Area | Risk Mitigated | Example |
---|---|---|
Lone Working | Reduces risk of harm when working alone | Require check-ins or buddy systems |
Manual Handling | Prevents injury when lifting IT equipment | Train staff on safe lifting of servers or monitors |
Working at Height | Avoids accidents when installing or repairing equipment | Use ladders and safety procedures |
Fire Safety | Minimises fire-related injury or damage | Provide staff training and exit procedures |
RIDDOR Compliance (2013) | Ensures reporting of injuries or hazards | Report electric shock from faulty cables |
Impact: These procedures help maintain a safe working environment for IT professionals and users.
Controls how changes to IT systems (like updates, installations or network adjustments) are approved and recorded.
How It Helps Mitigate Risk |
---|
Prevents unauthorised or untested system changes |
Ensures documentation for rollback if problems occur |
Supports planning and testing of updates before deployment |
Without this, rushed or undocumented changes could introduce vulnerabilities or system failures.
Regularly checks whether policies and procedures are being followed.
How It Helps Mitigate Risk |
---|
Ensures continued compliance with policies |
Identifies gaps or weaknesses in controls |
Enables organisations to update policies based on new risks or technologies |
For example, audits might uncover that users aren’t updating their passwords – prompting training or automation.
Policy to Protection
Scenario:
You’ve joined a company as an IT technician. You need to help a new employee understand how company rules help protect systems and people.
Task:
1. Match each risk below to the correct policy or procedure:
Risk of data theft from personal phones
Risk of injury when lifting a server
Risk of staff ignoring update reminders
Risk of applying a faulty update to live systems
2. For each match, explain how the policy or SOP helps reduce the risk.
Extension: Suggest one new policy that could help mitigate a modern threat like AI phishing or deepfake fraud.
A Game of Risk
Peer review the risk strategy and update following feedback. All risk strategies collected in and each one discussed in turn, highlighting security controls that could be implemented and how that would mitigate the risk (for example, software removal or reduces web access). Task to be tutor led to ensure all following are explored:
- Boundary firewalls and gateways.
- Secure configurations.
- Malware protection.
- Patch management.
- Access control.
Organisations need to follow legal rules, meet industry standards, and apply best practice guidelines to:
Keep information systems secure
Protect personal data and business assets
Stay compliant and avoid legal/financial penalties
Build trust with customers, users and partners
Purpose:
Sets legal rules on how personal data is collected, stored, used and shared. It protects people's right to privacy.
Applications in Digital Infrastructure:
Article | Purpose |
---|---|
Article 1 | States the objectives of protecting individuals’ personal data |
Article 2 | Explains what data and actions are covered (e.g. storage, transfer, access) |
Article 3 | Applies to UK-based organisations and others handling UK citizens' data |
Article 4 | Defines terms like "data subject", "processing", "consent" |
Article 5 | Sets principles: fairness, transparency, purpose limitation, accuracy, etc. |
Article 6 | Lists legal reasons for processing data (e.g. consent, legal obligation) |
Article 7 | Conditions under which consent is valid (clear, active, documented) |
Example: A company encrypts customer data and only keeps it for as long as needed — fulfilling Article 5.
Purpose:
The UK’s legal implementation of UK GDPR — makes data protection rules enforceable by law.
Key Applications:
Requirement | Risk Mitigated |
---|---|
Fair, lawful and transparent data usage | Prevents misuse of user data |
Specific and explicit purpose | Stops data being reused inappropriately |
Adequate and limited data | Minimises unnecessary data collection |
Accurate and up to date | Avoids errors and outdated information |
Not kept longer than needed | Reduces exposure to breaches |
Protected against loss, access, damage | Prevents leaks or hacking incidents |
Purpose:
Protects against unauthorised access and cybercrime.
Applications:
Offence Area | Example in Digital Infrastructure |
---|---|
Unauthorised access to systems or data | Hacking into a server or admin account |
Access with intent to commit another crime | Logging into a payroll system to steal data |
Acts to impair or damage systems | Installing ransomware or launching denial-of-service attack |
Violating this Act can lead to prosecution and imprisonment.
Purpose:
A global certification standard for managing information security in a business.
Applications:
Helps organisations comply with UK GDPR/DPA
Requires security policies, risk assessments, access control, and incident response plans
Encourages regular penetration testing and auditing
Used by banks, healthcare, cloud services to prove they're protecting data properly.
Purpose:
A worldwide standard to protect cardholder data and reduce payment fraud.
Applications:
Requirement | Example in Practice |
---|---|
Secure network setup | Firewalls between card systems and public networks |
Data protection | Encrypt card numbers, never store CVV codes |
Vulnerability management | Keep systems patched, use antivirus |
Access control | Only allow authorised staff to view cardholder data |
Monitoring and testing | Regular scans and logging of system activity |
Security policy | Documented processes for incident response and training |
Essential for any business that processes debit or credit cards.
Purpose:
Developed by the UK’s National Cyber Security Centre to guide organisations on improving digital security.
Applications in Digital Infrastructure:
Area | Description |
---|---|
User education | Train users to spot phishing and use strong passwords |
Mobile/home working | Secure VPNs and authentication for remote access |
Secure configuration | Disable unused services and ports |
Removable media controls | Block or scan USBs |
Managing user privileges | Apply the principle of least privilege |
Incident management | Have a plan for dealing with security breaches |
Monitoring | Use alerts, logs and audits to detect suspicious activity |
Malware protection | Use antivirus and malware scanning |
Network security | Firewalls, segmentation and secure Wi-Fi |
Risk management regime | Regular assessments and updates of risk strategy |
Helps businesses of any size build a layered cyber defence.
Purpose:
A global community improving the security of web applications through tools, resources and training.
Applications:
Provides tools like ZAP for testing security
Maintains the Top 10 Web Application Threats list (e.g. SQL injection, XSS)
Offers training resources for developers and IT professionals
Encourages secure coding practices from the start
Used by developers and security analysts to build safer web systems.
Law & Standards in Action
Task:
1. Match each real-world scenario to the relevant law or standard:
- Encrypting a customer database
- Detecting a malware attack and alerting users
- Restricting access to online payment processing software
- Reporting a phishing attack on a school network
2. For each, explain:
- Which law/standard/guideline applies
- How it mitigates risk
- What would happen if it was ignored
Extension: Research one more industry standard used in healthcare, education, or finance and explain its role.
Working in groups, each group assigned one of the topics above and to create a leaflet providing guidance for a new digital business.
Network security is about using policies, tools, and controls to protect systems and data from cyber threats, unauthorised users, and damage or loss.
The CIA triad forms the foundation of all digital security practices. It helps protect networks from attack, misuse, and failure.
Principle | Definition | Application to Security |
---|---|---|
Confidentiality | Ensuring that only authorised users can view or access data | - Using encryption - Implementing access control - Secure login procedures |
Integrity | Ensuring data is accurate and unchanged unless authorised | - Version control - Digital signatures - Hashing and checksums |
Availability | Ensuring that systems and data are accessible when needed | - Regular back-ups - Load balancing - Denial-of-service protection |
Example: If a user cannot access a system due to a DDoS attack, availability has been compromised.
These four principles are used together to ensure only the right people can access systems, and that all actions are tracked and controlled.
Stage | What It Means | Application |
---|---|---|
Identification | The system recognises who the user claims to be | Username, ID badge, unique user ID |
Authentication | Verifies the user's identity is genuine | Passwords, biometrics, smart cards, 2FA |
Authorisation | Grants access to what the user is allowed to do | Role-based access (e.g. a teacher vs IT admin) |
Accountability | Ensures actions can be traced back to a user | Logs, audit trails, monitoring user activity |
Together, these reduce the chances of unauthorised access or abuse of privileges.
These principles are put into action using tools and policies that help secure the network further.
Centralised systems that manage users, devices, permissions, and access rights.
Use Case:
Allows IT teams to control which users can access which folders, applications or devices
Supports group policies for password control and software permissions
Links directly to identification, authentication, and authorisation.
Validates users trying to access systems.
Examples:
Single sign-on (SSO): Log in once to access many systems
Multi-factor authentication (MFA): Combines password + something you have (e.g. phone)
Biometrics: Fingerprint, face scan
Strengthens authentication by requiring more than just a password.
Passwords must be strong, unique, and regularly updated to stay effective.
Best Practices:
Minimum 12 characters
Use of symbols, numbers, upper/lower case
No reuse across systems
Risks if not followed:
Easy password guessing or brute-force attacks
Credential stuffing using leaked passwords
Weak password policies can break confidentiality and authorisation.
Know what data exists, where it is, and how it must be protected.
Actions:
Classify data (e.g. personal, sensitive, public)
Encrypt sensitive files
Limit who can access/edit them
Supports confidentiality and integrity of the data.
A live inventory of all IT assets (hardware, software, databases, etc.)
Purpose:
Know what you have
Monitor who owns it
Understand which assets are most critical
Helps in risk management and disaster recovery
Ensures accountability, availability, and supports decision-making during a cyber incident.
Discuss network security and its application to prevent unauthorised access or misuse.
Discuss in small groups the CIA triad and IAAA.
Create a poster for the CIA triad (confidentiality, integrity and availability) showing how this is applied to security and how it helps protect against cyber attacks.
Secure the School Network
Scenario:
You are part of the IT team at a college. You need to protect the network from unauthorised access and maintain the confidentiality, integrity and availability of systems.
Task:
1. Identify three risks (e.g. weak passwords, unknown devices, unauthorised app installation).
2. For each, explain:
Which CIA principle is at risk
Which IAAA principle is needed to fix it
What policy, process or tool should be used to help
Extension:
Draw a diagram showing how a user logs in, is authenticated, is granted access, and has their activity monitored.
Network security architecture is the structure and strategy used to protect a digital system.
A key part of this is controlling who and what has access — ensuring only the right users, devices, and services are allowed through.
Definition:
The process by which a system verifies the identity of a user before allowing access.
Application:
Passwords, PINs, biometrics, multi-factor authentication (MFA)
Used at login portals, VPN access, or system logins
Ensures only authorised users get into the system
Definition:
A barrier between a trusted internal network and an untrusted external network, such as the internet.
Application:
Can allow or block specific types of traffic (e.g. HTTP, FTP)
Can be hardware-based (e.g. routers) or software-based
Controls which services are exposed, protecting against unauthorised external access
Definition:
A system that monitors network or system activity for signs of suspicious behaviour or attacks.
Application:
Detects brute-force attacks, unauthorised logins, malware activity
Sends alerts to admins for further investigation
Helps identify threats in progress (but does not stop them)
Definition:
Like IDS, but it can also block malicious activity as it is happening.
Application:
Works with firewalls to automatically prevent known threats
Can stop malware or hacking attempts in real-time
Helps maintain system integrity and availability by blocking attacks
Definition:
Controls access to a network based on an organisation’s security policies.
Application:
Devices must meet certain requirements (e.g. antivirus installed, updated OS)
Used in business environments to prevent rogue or insecure devices connecting
Ensures only compliant devices connect to the network
Access control defines who can access what, under what conditions.
Definition:
Access is granted based on a strict classification and security level hierarchy.
Application:
Common in military/government systems
Users cannot change permissions
Examples: Confidential, Secret, Top Secret levels
High-security environments where access must be centrally controlled
Definition:
Access is controlled by the owner of the resource.
Application:
The owner (e.g. file creator) decides who gets access
Found in many operating systems (Windows, macOS)
More flexible, but less secure than MAC – suitable for collaborative environments
Definition:
Access is granted based on user attributes (e.g. job title, location, time of access).
Application:
Complex environments needing dynamic, flexible control
Example: A manager can access payroll systems during office hours from within the building
Allows fine-grained control based on multiple factors
Definition:
Access is granted based on a user's job role.
Application:
Employees are grouped into roles (e.g. admin, HR, technician)
Each role has specific permissions
A technician may access service tickets, but not payroll
Simplifies management and enforces least privilege principle
Design a Secure Network Access Plan
Scenario:
You're designing access control for a school's network. Staff, students, and guests use the network daily.
Task:
1. For each group (staff, students, guests):
- Choose 1 access control model (e.g. RBAC for staff)
- Choose 1 supporting method (e.g. firewall, NAC)
2. Justify your decisions based on:
- The level of access needed
- The risks involved
- How you'll protect against misuse
Extension:
Draw a diagram of how a device is authenticated and granted access through a firewall, NAC, and RBAC.
Class discussion: Discuss in small teams common vulnerabilities. Each team is to select 3 of the following and the impact of this, including any security control:
Missing patches, firmware and security updates.
Password vulnerabilities.
Insecure BIOS/UEFI.
Misconfigurations.
Lack of protection software.
Disposal of data/devices.
Inadequate back up process.
DHCP Spoofing.
VLAN attacks.
Misconfigured firewalls or ACL’s.
Exposed services or ports.
Ineffective network design.
Unprotected devices.
K1.26 Physical and virtual methods of managing and securing network traffic and their application
within the design of network security architecture:
• physical (for example server management, firewalls and cabling):
o software defined networking (SDN):
â–ª transport layer security (TLS) (for example used in banking websites)
o screened subnet
o air gapping
• virtual:
o virtual LAN (VLAN):
o subnets:
o virtual private network (VPN) (for example intranet, file systems, local network systems)
o virtual routing and forwarding (VRF)
o IP security (IPSec)
o air gapping
K1.27 The principles and applications of cyber security for internet-connected devices, systems and
networks:
• the CIA (confidentiality, integrity and availability) triad – applied to assess the impact on security of
systems (for example a data breach):
o protection and prevention against a cyber attack through secure configuration of a network
o limiting the network or system exposure to potential cyber attacks
o detection of cyber attacks and effective logging/auditing to identify impacts
o appropriate segregation of devices, networks and resources to reduce the impact of a cyber
attack
What it is: Methods to secure Wi‑Fi networks and prevent unauthorised access.
Key Method:
WPA2 (Wi‑Fi Protected Access 2):
A strong encryption protocol for Wi‑Fi traffic.
Example: College Wi‑Fi is configured with WPA2 so that only authorised staff and students with the correct password can connect.
Extra Layer:
End‑to‑end security:
Encrypts data from the device to the access point or service.
Example: A user’s laptop sends encrypted data via WPA2 so even if intercepted, the data is unreadable.
What it is: Measures to protect individual devices from misuse or theft of data.
Methods:
Strong passwords or PINs
Biometric authentication (fingerprint, facial recognition)
Application:
A company issues tablets to staff that require fingerprint login, reducing risk if a device is lost.
What it is: Converting data into unreadable code without the correct key.
Application:
Data at rest: Full disk encryption on laptops to protect stored files.
Data in transit: SSL/TLS encryption for online transactions.
Example: A business uses TLS on its website so customer card details are secure when entered online.
What it is: Running multiple virtual systems on one physical machine, isolating environments.
Application:
Test environments are created on virtual machines so malware cannot spread to the live network.
Virtual desktops allow employees to access a secure corporate system from home without saving sensitive data locally.
What it is: Ethical hacking to identify vulnerabilities before attackers do.
Application:
A school hires a cyber‑security firm to simulate an attack on its student portal and fix any weaknesses found.
What it is: Tools and practices that stop malicious software.
Application:
Anti‑malware software scans files on download.
Example: Email attachments are scanned automatically to block ransomware.
What it is: A subset of malware protection specifically targeting viruses.
Application:
Regular updates ensure new virus signatures are recognised and quarantined before harm is done.
What it is: Keeping operating systems, applications and firmware current.
Application:
A college’s IT department installs the latest patch for its firewall to fix a critical vulnerability.
Prevents exploitation by attackers using known bugs.
What it is: Requires two or more verification steps.
Application:
Staff log in with a password and a code sent to their phone.
Even if a password is stolen, access is blocked without the second factor.
What it is: Logs the user out of all connected sessions and services at once.
Application:
A teacher logs out of the central portal, automatically ending sessions on email, storage and HR systems.
Reduces risk of an unattended active session being exploited.
Lockdown
Scenario:
You are asked to secure a new network for a small business.
Task:
1. Select three techniques from the list above.
2. For each technique:
- Explain how it protects against threats (e.g. unauthorised access, malware).
- Give an example of how you would implement it in the network design.
Extension:
Design a simple diagram of the network showing where each technique would be applied (e.g. firewall at perimeter, MFA at user login, virtualisation on server).
Cyber security is vital for protecting systems, data and people. Without effective cyber security, organisations and society are at risk from data breaches, financial loss, reputational damage and legal action.
Below we look at how it affects organisations and society.
Modern organisations rely on digital infrastructure to run daily operations. Cyber security ensures:
Protection of all systems and devices
Servers, laptops, mobile devices and IoT equipment are secured against unauthorised access, malware and data loss.
Example: A company installs endpoint protection on all laptops to stop ransomware infections.
Protection of cloud services and their availability
Many businesses use cloud services for storage, email, and collaboration.
If these services are compromised, productivity stops.
Example: A school ensures its cloud‑based student records system uses secure logins and encryption to prevent downtime or hacking.
Protection of company data and information
Commercially sensitive data (e.g. financial records, intellectual property) must be kept confidential.
Example: A business uses encryption and access controls so only senior management can view strategic plans.
Protection of personnel data and data subjects
Employee and customer personal data must be handled securely to avoid breaches.
Example: HR systems store employee addresses and bank details; strong passwords and MFA protect this information.
Password protection policies for users and systems
Enforcing strong, regularly updated passwords prevents easy account compromise.
Example: Staff must change passwords every 60 days and use complex passphrases.
Adherence to cyber security legislation
Compliance with UK GDPR and DPA 2018 avoids fines and reputational harm.
Example: A company that mishandles customer data could face a substantial ICO penalty.
Protection against cybercrime
Prevents financial loss, fraud, phishing attacks, and ransomware.
Example: A retail company blocks card skimmers and uses PCI DSS standards to protect transactions.
Cyber security is not just an organisational issue — it protects individuals and the wider community.
Protection of personal information
Prevents unauthorised use of sensitive data.
Maintains privacy and security online.
Protects people from prejudices or discrimination (e.g. medical or employment data being leaked).
Ensures equal opportunities by safeguarding sensitive records.
Example: Encryption of hospital patient records stops them being sold on the dark web.
Preventing identity theft
Secure handling of names, addresses, national insurance numbers, and financial details stops criminals using someone’s identity for fraud.
Individuals’ rights under the DPA 2018
Cyber security measures help ensure that these rights are respected:
Be informed about how data is used
Access personal data
Have incorrect data updated
Have data erased (right to be forgotten)
Restrict processing of data
Data portability (reuse data across services)
Object to certain processing
Example: A social media platform must have secure systems so users can safely download or delete their own data.
Protection against cybercrime
Society benefits when fewer people are victims of fraud, phishing or online harassment.
Example: Strong online banking security reduces large‑scale fraud.
Area | Why it’s Important | Example |
---|---|---|
Organisations | Prevents data breaches, legal penalties, loss of trust | Business avoids fines by following UK GDPR |
Society | Protects individual privacy, stops identity theft | Secure healthcare systems keep patient data safe |
The Advisor
Scenario:
You are advising a local business on why they should invest in stronger cyber security.
Task:
Write a short report with two sections:
For the organisation: Explain three reasons cyber security is important and give an example for each.
For society: Explain two reasons why good cyber security helps the wider community, with examples.
Extension:
Identify one recent real‑world cybercrime incident and describe how it affected both the organisation and its customers or the public.
In pairs collaborate and create a presentation on the following (Each topic must be covered). The presentation will be delivered to the class:
Managing and controlling access to systems. This should consider things like authentication, detection and prevention, firewalls, and the various types of access control.
Physical and virtual methods of managing and securing network traffic. This should consider things like software defined networking, screened subnet, virtual LANs and subnets.
Techniques applied to ensure cyber security for internet connected devices. This should consider wireless security, device security, encryption, virtualisation, penetration testing, protection, updates and authentication.
Importance of cyber security to organisations and society. This should consider the protection of systems and data on the organisation and society.
The fundamentals of network topologies. This should include topologies, OSI and TCP/IP models.
The application of cyber security principles. This should include the management of risks to security and the network (identification), development and application of control measures (protection), implementation of protection and resources to identify issues (detection), reaction to security (respond) and restoration (recover).
A network topology describes how devices (nodes) are connected and how data travels through the network.
Topology | Description | Advantages | Disadvantages | Example |
---|---|---|---|---|
Bus | All devices share a single backbone cable. | Cheap, easy to install. | A single cable fault can bring down the network, data collisions. | Early small office networks. |
Star | Devices connect to a central hub or switch. | Easy to add/remove devices, centralised management. | If the hub fails, the network goes down. | Most modern LANs. |
Ring | Each device connects to two others, forming a circle. | Data flows in one direction, reduced collisions. | A fault in one device can break the whole network. | Older token ring networks. |
Token Ring | A special type of ring where a “token” controls access. | Prevents data collisions. | Outdated, expensive to maintain. | Legacy corporate systems. |
Mesh | Every device connects to every other device. | Very resilient, multiple paths for data. | Very costly, complex cabling. | Military or critical networks. |
Hybrid | Combines two or more topologies. | Flexible, scalable. | Can be expensive and complex. | Large organisations combining star and mesh. |
Client‑Server | Clients (e.g. user devices) request services from a central server. | Centralised management, easier backups. | Server failure affects all clients. | Websites, school networks. |
Peer‑to‑Peer (P2P) | Devices act as both client and server. | Cheap, easy to set up. | Harder to secure, no central control. | File‑sharing between home PCs. |
These models explain how data travels through network layers.
Layer | Purpose | Example |
---|---|---|
Application | End‑user applications | Email client, web browser |
Presentation | Data formatting/encryption | SSL/TLS encryption |
Session | Establish/maintain sessions | Session tokens, logins |
Transport | Reliable delivery, error checking | TCP, UDP |
Network | Addressing, routing | IP addressing, routing tables |
Data Link | Node‑to‑node transfer | Ethernet frames |
Physical | Hardware transmission | Cables, switches |
Layer | Purpose | Example |
---|---|---|
Application | Interfaces for end‑user processes | HTTP, FTP |
Transport | Manages communication and reliability | TCP, UDP |
Network | Logical addressing and routing | IP addressing |
Network Interface | Physical delivery of data | Ethernet, Wi‑Fi |
Comparison:
The TCP/IP model is simpler (4 layers) and more widely used today, while the OSI model is more detailed (7 layers) and is often used as a teaching reference.
Modern network design must include minimum cyber security standards to protect users, systems and data.
These are based on five key principles:
Manage risks to network security, users and devices.
Assign a cyber security lead.
Perform risk assessments to find vulnerabilities.
Document configurations and responses to threats.
Example:
An IT team maintains a configuration log for all routers and performs regular threat assessments.
Apply controls to minimise potential risks.
Implement anti‑virus software and firewalls.
Reduce the attack surface (disable unused services/ports).
Use trusted, supported operating systems.
Decommission old, vulnerable systems.
Carry out regular security audits.
Encrypt data at rest and in transit.
Assign minimum access (least privilege).
Provide staff with cyber security training.
Example:
All staff accounts use multi‑factor authentication and only have access to resources relevant to their role.
Identify security issues quickly.
Apply monitoring tools and procedures.
Review audit logs and event logs.
Monitor network activity for anomalies.
Example:
A company uses an IDS (Intrusion Detection System) to alert admins to unusual network traffic.
React to contain and minimise the impact of incidents.
Have a defined incident response plan.
Contain the threat, isolate affected systems.
Example:
If ransomware is detected, the affected server is immediately taken offline to stop spread.
Restore systems and data and improve for the future.
Maintain up‑to‑date backups.
Document and review incidents for lessons learned.
Example:
After a cyber attack, IT restores files from cloud backups and updates their policies to prevent recurrence.
One Vision
Scenario: You are designing a secure network for a small organisation.
Task:
1. Choose one topology (e.g. star) and explain why it suits the business.
2. Map the network using either the OSI or TCP/IP model.
3. Apply the five cyber security principles (identify, protect, detect, respond, recover) to your chosen topology and justify each step.
Extension:
Draw a labelled diagram showing:
- Your chosen topology
- Where you would implement firewalls, IDS/IPS, and access controls.
Below is each vulnerability with its risk and control measures.
Risk:
Outdated systems contain known flaws that attackers exploit.
Controls:
Patch manager software to deploy updates automatically across devices.
Tracking network traffic to spot unusual activity that might exploit old vulnerabilities.
Test groups/devices used to test updates before full rollout.
(e.g. missing, weak, or default passwords; no lockout against brute force attacks)
Risk:
Attackers gain unauthorised access with minimal effort.
Controls:
Enforce minimum password requirements (length, complexity, special characters) following NCSC guidance.
Apply a password reset policy (e.g. mandatory reset if compromise suspected).
Enable account lockout after repeated failed attempts.
Risk:
Attackers bypass OS-level security by modifying boot settings.
Controls:
Review BIOS/UEFI settings to disable unused ports and secure boot.
Update BIOS/UEFI regularly to fix firmware vulnerabilities.
Risk:
Users or services have excessive rights, increasing attack surfaces.
Controls:
Regularly test permissions and access rights to match job roles.
Scheduled auditing (e.g. immediately remove access for leavers or role changes).
Risk:
Malware infections such as viruses, worms, trojans or ransomware.
Controls:
Install and maintain anti-malware and endpoint protection.
Regularly update and monitor security software.
Mitigate buffer overflow risks through updates and secure coding practices.
Risk:
Sensitive data recovered from discarded equipment.
Controls:
Follow WEEE Directive 2013 for safe hardware disposal.
Check and wipe all storage before disposal (e.g. degaussing, shredding drives).
Risk:
Loss of critical data after incidents.
Controls:
Set back‑up frequency (daily, weekly) according to business needs.
Use appropriate types of back‑up (full, incremental, differential).
Risk:
Attackers provide fake IP configurations to intercept traffic.
Controls:
Enable DHCP snooping on network switches to validate legitimate servers.
Risk:
Attackers jump between VLANs to reach protected resources.
Controls:
Conduct implementation testing of VLANs.
Schedule regular monitoring to detect unusual VLAN activity.
Risk:
Improper rules allow unwanted traffic through.
Controls:
Test firewall rules against policy requirements.
Apply scheduled monitoring and updates to firewall firmware and policies.
(e.g. plugging into an open Ethernet port)
Risk:
Unauthorised devices access the internal network.
Controls:
Apply physical security controls (e.g. lock ports, secure rooms).
Monitor network traffic for unknown devices or services.
Risk:
Traffic allowed or denied incorrectly, exposing sensitive resources.
Controls:
Regularly monitor and review ACLs to match security policy.
(e.g. poor placement of firewalls or screened subnets)
Risk:
Increases exposure to external threats.
Controls:
Perform a full design review before implementation.
Carry out implementation testing to ensure correct segmentation.
Risk:
Devices without proper software or hardening are vulnerable.
Controls:
Install correct security software and apply configuration best practices (e.g. disable unused ports, encrypt disks).
Its Dangerous out there
Scenario:
You are a network security consultant reviewing a company’s infrastructure.
Task:
1. Pick three vulnerabilities from the list above.
2. For each:
Explain why it’s a risk.
Describe two controls you would apply to mitigate it.
Extension:
Create a checklist for the company to follow during their next security audit.
Discuss with the rest of the class the common vulnerabilities, reflect on each of the following and the impact of this, including any security control:
- Missing patches, firmware and security updates.
- Password vulnerabilities.
- Insecure BIOS/UEFI.
- Misconfigurations.
- Lack of protection software.
- Disposal of data/devices.
- Inadequate back up process.
- DHCP Spoofing.
- VLAN attacks.
- Misconfigured firewalls or ACL’s.
- Exposed services or ports.
- Ineffective network design.
- Unprotected devices