Skip to main content

Principles of cybersecurity

This lesson comprises eight (8) master classes focusing on:

  • Privacy, trust and security
  • Cybersecurity
  • Cybercrime
  • Sources of vulnerability
  • Cyber risk management
  • Cyber law and ethics

Content:


Understanding privacy and security

  • Explain privacy, trust and freedom of information with respect to people, systems and data
  • Describe privacy and security principles associated with access, storage and permissions used by enterprises to collect and interpret data
  • Investigate how an individual can contribute to maintaining the privacy of their own data
  • Explore security vulnerabilities of social networking to both an individual and an enterprise, including:
    • account access
    • account behaviour
    • hosting platform security
    • identity theft
    • phishing
    • evil twins
  • Describe the attributes of a cybersecurity breach, including:
    • confidentiality of information
    • integrity of information
    • availability of information
    • privacy implications
  • Investigate vulnerabilities exploited by the threat actor involved in a breach, such as the impact on various elements, including:
    • data
    • people
    • processes
    • technology

 

Security awareness

  • Investigate cybercrime threats to an enterprise, including:
    • hacking
    • phishing, including smishing
    • scamming
    • bots and botnets
    • employee action causing a vulnerability
  • Research hardware and software strategies used to protect data, including:
    • isolation
    • physical security
    • biometrics
    • password protection, encryption and permissions
    • multi-factor authentication
    • back up and disaster recovery
    • firewalls
    • antivirus and anti-malware
  • Investigate cyber risk management, including:
    • implementing a cybersecurity strategy with ongoing training
    • identifying and managing vulnerabilities
    • assessing the impact of a breach
    • controlling damage and loss
  • Assess cyber risk by implementing risk-management strategies using a risk matrix, including:
    • internal and external vulnerabilities
    • threat landscape
    • impact of exposure
    • likelihood of exploitation

 

Cyber law and ethics

  • Explain impacts of cybersecurity breaches on the individual, organisation and society, including:
    • financial loss
    • reputational damage
    • operational disruptions
    • legal and regulatory ramifications
  • Identify laws and legislation associated with cybersecurity
  • Explore current and emerging cybercrime threats to an enterprise