week 10

Individual Report Task: Plan and Execute a Basic Set of Tasks to Protect a Device Against Attack

 

 

Task Overview

 

In this task, you will plan and carry out a basic set of security steps to protect a generic device (such as a smartphone, laptop, or tablet) against cyber attacks.

 

Your report should be 200–300 words and explain what actions you would take, why they are important, and how they help secure the device.

 

 

 

Title Page

 

Include your name, date, and a title (e.g., Planning and Executing Basic Tasks to Protect a Device Against Attack).

 

 

 

1. Outline of Basic Security Tasks to Carry Out

 

List the security steps you will plan and execute on your chosen device.

 

Suggested areas to cover:

 

  • Enable a Device Firewall
  • Install and Configure Antivirus Software
  • Apply All Operating System Updates
  • Set Up a Strong Password or Biometric Lock
  • Enable Full Disk Encryption
  • Install and Configure a VPN App
  • Enable Two-Factor Authentication (2FA) on Important Apps

 

 

 

2. Explanation of Why Each Task is Important

 

Briefly explain how each task helps defend the device against different types of attacks.

 

For example:

 

  • Enable a Device Firewall
    • A firewall blocks unauthorised traffic from reaching your device, protecting it from external threats.
  • Install and Configure Antivirus Software
    • Detects and removes malware, viruses, and other malicious software that could compromise your device.
  • Apply All Operating System Updates
    • Updates often fix vulnerabilities that hackers could otherwise exploit. Keeping systems updated is a key defence.
  • Set Up a Strong Password or Biometric Lock
    • Protects the device from unauthorised physical access. Strong passwords or biometrics make it harder for attackers to break in.
  • Enable Full Disk Encryption
    • Ensures that even if the device is stolen, the data stored on it remains secure and unreadable without the encryption key.
  • Install and Configure a VPN App
    • Encrypts your internet connection, especially when using public WiFi, preventing data interception.
  • Enable Two-Factor Authentication (2FA)
    • Adds an extra security layer to important accounts and apps, making it much harder for attackers to gain access even if passwords are compromised.

 

 

 

3. Summary of How These Tasks Protect the Device

 

Briefly describe how combining these actions creates a stronger overall security setup.

 

Example:

“Individually, each action protects against specific risks. Together, they provide multiple layers of defence, significantly reducing the chance of a successful attack.”

 

 

 

4. Additional Resources and Further Reading

 

Include links to guides or government advice on securing devices.

 

Example:

 

 

 

 

Submission and Marking Criteria

 

Your report should be 200–300 words and must be clear, practical, and show good understanding of device security.

 

✔️ Accuracy of Tasks – Are the steps practical and correctly explained?

✔️ Practical Understanding – Are the tasks realistic and effective for protecting a device?

✔️ Presentation and Clarity – Is the report well-structured and easy to follow?

 

 

 

Final Note

 

This task will help you understand the basic actions required to secure a device and how to create a simple, practical protection plan against common cyber threats. Use real-world examples where possible!

 


Last Updated
2025-05-12 10:41:18

English and Maths

English


Maths


Stretch and Challenge

Stretch and Challenge


  • Fast to implement
  • Accessible by default
  • No dependencies
Homework

Homework


Equality and Diversity Calendar
How to's

How 2's Coverage




Links to Learning Outcomes

Links to Assessment criteria

 


Files that support this week


| | | | |
Week 9
Prev
Week 10
Prev
Week 11
Prev

Next