Week 1 | T&L Activities:8.1 Security risks8.1.1 Know the type of confidential information held by organisations: • Human Resources: o salaries and benefits o staff personal details • commercially sensitive information: o client details o stakeholder details o intellectual property o sales numbers o contracts • access information: o usernames o passwords o multi-factor authentication details o personal identification number (PIN) o access codes o passphrases o biometric data. 8.1.2 Understand why information must be kept confidential by organisations: • salary and benefits: o prevent competitors from offering higher wages to attract staff o prevent employees from comparing salaries/demanding comparable pay • staff details: o protect privacy o prevent competitors from directly contacting them • intellectual property: o prevent competitors from copying designs • client details: o prevent competitors from contacting clients o protect client privacy • sales numbers • access information: o prevent unauthorised access. 8.1.3 Understand the potential impact to an organisation of failing to maintain privacy and confidentiality: • non-compliance with regulations: o loss of licence to practice • loss of trust • damage to organisation’s image • financial loss: o fines o refunds o loss of earnings/termination of contracts • legal action • reduced security. Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
Maths:
|
|||||
Stretch and Challenge:
|
E&D / BV | ||||
Homework / Extension:
|
ILT | ||||
→ | → | → | → | → | → |
Week 2 | T&L Activities:8.2 Types of threats and vulnerabilities8.2.1 Understand potential technical threats and their impacts on organisations and individuals, including prevention and mitigation methods: • botnets • denial of service (DoS)/Distributed Denial of Service (DDoS) • malicious hacking: o hacktivists/nation states/organised crime/individual o password cracking/brute force o cross-site scripting o SQL injection o buffer overflow • malware: o viruses o worms o key loggers o ransomware o spyware o remote access trojans • social engineering: o phishing o spear phishing o smishing o vishing o pharming o watering hole attacks o USB baiting • domain name server attack/redirection of traffic • open/unsecured Wi-Fi networks. 8.2.2 Understand potential technical vulnerabilities to systems and data: • inadequate security processes: o weak encryption o inadequate password policy o failure to use multi-factor authentication • out-of-date components: o hardware o software (lack of support/compatibility with legacy systems, zero-day bugs) o firmware. 8.2.3 Understand potential human threats, including prevention and mitigation methods, to systems and data: • human error: o file properties o confirmation boxes o staff training • malicious employee: o immediate removal from the premises o suspend user accounts immediately • disguised criminal: o accompany all visitors o check identification of visitors • poor cyber hygiene: o locking all unattended machines o not writing passwords down o poor password management. 8.2.4 Understand potential physical vulnerabilities, including prevention and mitigation methods, to systems, data and information, including: • lack of access control: o entry control systems • poor access control: o do not allow tailgating o use complex access codes o change codes regularly o monitor access areas o audit of staff access to secure areas • nature of location: o protect against shoulder surfing o protect against the environment o protect against vandalism • poor system robustness: o rugged machines • natural disasters. 8.2.5 Understand the potential impact to an organisation of threats and vulnerabilities: • loss/leaking of sensitive data • unauthorised access to digital systems • data corruption • disruption of service • unauthorised access to restricted physical areas. Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
Maths:
|
|||||
Stretch and Challenge:
|
E&D / BV | ||||
Homework / Extension:
|
ILT | ||||
→ | → | → | → | → | → |
Week 2 | T&L Activities:8.4 Interrelationship of components required for effective security8.4.1 Understand how the relationships in the CIA triad interrelate: • confidentiality: o ensuring that data is kept private by controlling who has access to the data • integrity: o ensuring that the data has not been tampered with; this can be done by maintaining confidentiality • availability: o ensuring that data is available and useful; this can be done by ensuring integrity. 8.4.2 Understand the elements of the Identification Authentication Authorisation Accountability (IAAA) model, including the techniques used and their benefits and drawbacks: • identification: o recognising the individual within a digital system o knowledge-based identification, including username o possession-based identification methods o biometric-based ID methods • authentication: o verifying the identity claimed during the identification phase o multi-factor authentication methods o passwords and pass phrases o biometric authentication • authorisation: o ensuring that authenticated users can only access resources and perform actions that they are permitted to o role-based using the role of the user within the digital system o access control lists • accountability: o ensuring that any actions within a system can be traced back to the responsible user o audit logs o user activity monitoring. Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
Maths:
|
|||||
Stretch and Challenge:
|
E&D / BV | ||||
Homework / Extension:
|
ILT | ||||
→ | → | → | → | → | → |
Week 2 | T&L Activities: Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
Maths:
|
|||||
Stretch and Challenge:
|
E&D / BV | ||||
Homework / Extension:
|
ILT | ||||
→ | → | → | → | → | → |
Week 3 | T&L Activities:8.3 Threat Mitigation
8.3.1 Understand the purposes, processes, benefits and drawbacks of common threat mitigation techniques: • security settings: o hardware o software • anti-malware software: o function o actions • intrusion detection • encryption: o hashing o symmetric o asymmetric • user access policies • staff vetting • staff training • software-based access control • device hardening • backups: o type (full, incremental, differential) o safe storage • software updates • firmware/driver updates • air gaps • certification of APIs (application programme interface) • VPNs (Virtual private networks) • multi-factor authentication (MFA) • password managers • port scanning • penetration testing: o ethical hacking o unethical hacking 8.3.2 Understand the processes and procedures that assure internet security, and the reasons why they are used: • firewall configuration: o rules for traffic (inbound and outbound) o traffic type rules o application rules o IP address rules • network segregation: o virtual o physical o offline network • network monitoring • port scanning. Files that support this week | English:
|
Assessment:
|
Learning Outcomes:
|
Awarding Organisation Criteria:
|
Maths:
|
|||||
Stretch and Challenge:
|
E&D / BV | ||||
Homework / Extension:
|
ILT | ||||
→ | → | → | → | → | → |