Cyber Security: ICDL Module
Cyber Security: ICDL Module
Cyber Security
Syllabus Version
13
3 13
ICDL - Cyber Security V1.0 (Part 1)
1 Security 1.1 Data Threats 1.1.1 Distinguish between data and information.
Concepts
1.1.2 Understand the terms cybercrime, hacking.
13
1.3.3 Identify methods of identity theft like:
information diving, skimming, pretexting.
13
2.3 Resolving 2.3.1 Understand the term quarantine and the
and Removing effect of quarantining infected/suspicious files.
3. Network 3.1 Networks and 3.1.1 Understand the term network and recognize the
Security Connections common network types like: local area network
(LAN), wireless local area network (WLAN),
wide area network (WAN), virtual private
network (VPN).
4. Access Control 4.1 Methods 4.1.1 Identify measures for preventing unauthorized
access to data like: user name, password, PIN,
encryption, multi-factor authentication.
13
4.1.2 Understand the term one-time password and
its typical use.
5. Secure Web 5.1 Browser 5.1.1 Select appropriate settings for enabling,
Use Settings disabling autocomplete, auto-save when
completing a form.
7 13
6.1.4 Identify common characteristics of phishing like:
using names of legitimate organisations, people,
false web links, logos and branding, encouraging
disclosure of personal information.
8 13
6.4.3 Be aware that mobile applications can extract
private information like: contact details, location
history, images.
7. Secure Data 7.1 Secure and 7.1.1 Recognise the importance of having a backup
Management Back up Data procedure in case of loss of data from computers
and devices.
9 13
ICDL - Cyber Security V1.0 (Part 2)
10 13
2.3.10 Know how to switch on the Internet filter to block
inappropriate Internet content.
2.6 The Digital 2.6.1 Be aware of the content to which people can
Underworld get access outside the World Wide
Web (.com, .org, etc.)
4. IDENTITY 4.1 Personal 4.1.1 Consider who can access your personal
Identity information: friends, work colleagues, employers,
criminals, predators.
5. CITIZEN 5.1 Videos/ 5.2.4 Understand how file sharing web sites work, and
PROTECTION Blogs the potential for viruses and malware from using
file sharing sites.
11 13
5.2 Cyber 5.2.1 Recognise and understand what Cyberbullying is.
Bullying
5.2.2 Understand the mediums through which
Cyberbullying can occur.
12 13
5.3.9 Understand that organisations should have
publically stated disclaimers which clarify that
employees' opinions on social media are personal
and do not represent the organisation.
5.4 Online 5.4.1 Understand how Internet use can interfere with
Addiction daily life, work and relationships.
6.2 Copyright 6.2.1 Be aware of copyright laws and their impact for
illegal downloads using file sharing services.
13 13