Skip to content

icon picker
formative assessment

Data Security

L5 DS

1 data storage

identify options for storing data including cloud solutions
identify data which references a person (personal) and other data (non-personal)
identify confidentiality status of data: private or public
identify personal data related social media sites and apps

2 ethics

ethical considerations by organisation for storing personal data
processes to collect and use data in an ethical manner
discriminate for inclusion or exclusion of sensitive data on ethical grounds

3 laws

laws for human freedoms (right to family life)
key provisions of Freedom of Information Act
responsibilities of controllers and processors required by GDPR
Legal purpose of GDPR, related laws
key provisions of GDPR
exemptions for Freedom of Information

4 companies and sectors (L6)

5 best practice (same as L6)

6 physical, perimeter and internal network security (same as L6)

7 risk of sharing data (same as L6)

8 keeping data secure (same as L6)

9 cause and effect of breaches (same as L6)

10 strategies to protect data (same as L6)

L6

DS-LO 1, 2, 3

1 storage: (looks like L5?)

identify options for storing data including cloud solutions
identify data which references a person (personal) and other data (non-personal)
identify confidentiality status of data: private or public
identify personal data related social media sites and apps

4 companies and sectors LO1d p10

recognise profile for a small company, medium, large
identify sector for a company type
match job titles with typical responsibilities / duties

5 best practice LO1c, f p15, task 13

sources of government advice
techniques for physical network
organisational resilience and business continuity (techniques)
key cyber-resilience techniques
best practice techniques and strategies
securing personal mobile devices of employees

6 physical, perimeter and internal network security LO1e p17

explain network structure vocabulary
describe functionality of network components
identify strategies belonging to physical, perimeter and internal
describe the various information publications from NCSC
describe cyber resilience

7 risks with sharing data LO1a, b p20

describe how publicly available personal data might be used by 3rd parties
describe additional data stored along with file contents
describe basic actions for cyber hygiene
describe AI applications related to personal data eg on social media

8 keeping data secure LO1f, g p23

describe general principles for keeping data secure online
malware risks
encryption for data storage and data transfer
additional security options available
wifi risks

9 cause and effect of breaches LO1a, b (L5)

describe key facts about real life breaches
describe consequences of breaches for the company affected
describe consequences of breaches for the individuals affected
describe how to check if an account has been part of a breach
common causes of data breach

10 strategies to protect data LO2 a, b, c, d, e, f p38

anti-virus techniques and suppliers
biometric security techniques
firewall functions
table top exercises
software patching
work of the ICO
digital forensics

Resources for Developing Small business Security Strategy

Self-assessment for a business or organisation
Loading…
Loading…
Booklets for download or viewing
More technical detail for mid-large companies with some specialist support
Loading…
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.