JavaScript required
We’re sorry, but Coda doesn’t work properly without JavaScript enabled.
Skip to content
NPA Cyber Security Contents
Data Security
Ethical Hacking
Digital Forensics
formative assessment
More
Share
Explore
formative assessment
formative assessment
Data Security
L5 DS
1 data storage
identify options for storing data including cloud solutions
identify data which references a person (personal) and other data (non-personal)
identify confidentiality status of data: private or public
identify personal data related social media sites and apps
2 ethics
ethical considerations by organisation for storing personal data
processes to collect and use data in an ethical manner
discriminate for inclusion or exclusion of sensitive data on ethical grounds
3 laws
laws for human freedoms (right to family life)
key provisions of Freedom of Information Act
responsibilities of controllers and processors required by GDPR
Legal purpose of GDPR, related laws
key provisions of GDPR
exemptions for Freedom of Information
4 companies and sectors (L6)
5 best practice (same as L6)
6 physical, perimeter and internal network security (same as L6)
7 risk of sharing data (same as L6)
8 keeping data secure (same as L6)
9 cause and effect of breaches (same as L6)
10 strategies to protect data (same as L6)
L6
DS-LO 1, 2, 3
1 storage: (looks like L5?)
identify options for storing data including cloud solutions
identify data which references a person (personal) and other data (non-personal)
identify confidentiality status of data: private or public
identify personal data related social media sites and apps
4 companies and sectors LO1d p10
recognise profile for a small company, medium, large
identify sector for a company type
match job titles with typical responsibilities / duties
5 best practice LO1c, f p15, task 13
sources of government advice
techniques for physical network
organisational resilience and business continuity (techniques)
key cyber-resilience techniques
best practice techniques and strategies
securing personal mobile devices of employees
6 physical, perimeter and internal network security LO1e p17
explain network structure vocabulary
describe functionality of network components
identify strategies belonging to physical, perimeter and internal
describe the various information publications from NCSC
describe cyber resilience
7 risks with sharing data LO1a, b p20
describe how publicly available personal data might be used by 3rd parties
describe additional data stored along with file contents
describe basic actions for cyber hygiene
describe AI applications related to personal data eg on social media
8 keeping data secure LO1f, g p23
describe general principles for keeping data secure online
malware risks
encryption for data storage and data transfer
additional security options available
wifi risks
9 cause and effect of breaches LO1a, b (L5)
describe key facts about real life breaches
describe consequences of breaches for the company affected
describe consequences of breaches for the individuals affected
describe how to check if an account has been part of a breach
common causes of data breach
10 strategies to protect data LO2 a, b, c, d, e, f p38
anti-virus techniques and suppliers
biometric security techniques
firewall functions
table top exercises
software patching
work of the ICO
digital forensics
Resources for Developing Small business Security Strategy
Self-assessment for a business or organisation
Loading…
Loading…
Booklets for download or viewing
https://www.ncsc.gov.uk/collection/small-business-guide/cyber-security-small-business-guide-infographic
More technical detail for mid-large companies with some specialist support
Loading…
Data Security
L5 DS
1 data storage
2 ethics
3 laws
4 companies and sectors (L6)
5 best practice (same as L6)
6 physical, perimeter and internal network security (same as L6)
7 risk of sharing data (same as L6)
8 keeping data secure (same as L6)
9 cause and effect of breaches (same as L6)
10 strategies to protect data (same as L6)
L6
1 storage: (looks like L5?)
4 companies and sectors LO1d p10
5 best practice LO1c, f p15, task 13
6 physical, perimeter and internal network security LO1e p17
7 risks with sharing data LO1a, b p20
8 keeping data secure LO1f, g p23
9 cause and effect of breaches LO1a, b (L5)
10 strategies to protect data LO2 a, b, c, d, e, f p38
Resources for Developing Small business Security Strategy
Digital Forensics
level 4
level 5
df process L5
df act (laws and legislation) L5
DF seizure L5
level 6
Assessment instructions
Evidence
image.png
GBLOKE
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
Ctrl
P
) instead.