1.1 Describe the concepts of cyber security.
Cyber Security
|
Unit Reference Number |
T/618/6097 |
|
Unit Title |
Cyber Security |
|
Unit Level |
3 |
|
Number of Credits |
10 |
|
Total Qualification Time (TQT) |
100 |
|
Guided Learning Hours (GLH) |
40 |
|
Mandatory / Optional |
Mandatory |
|
Sector Subject Area (SSA) |
14.1 Foundations for learning and life |
|
Unit Grading Structure |
Pass / Fail |
Unit Aims
The aim of this unit is to enable learners to understand about cyber security and the consequences and implications of inadequate cyber security. They will understand key terminology and the motivations of good and bad actors. They will also investigate the advantages and disadvantages of security by design.
Learning Outcomes, Assessment Criteria and Indicative Content
|
Learning Outcomes – The learner will: |
Assessment Criteria – The learner can: |
Indicative contents |
|
1. Understand cyber security. |
1.1 Describe the concepts of cyber security. 1.2 Explain the importance of cyber security for businesses. 1.3 Describe the consequences and implications of inadequate cyber security for businesses . |
security, identity, confidentiality, integrity, availability, threat, vulnerability, risk, hazard.
cost of breaches, sophisticated hackers, widely available hacking tools, tighter regulations (GDPR)
|
|
|
|
unauthorised access to distribution of or loss of, sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, industry information systems. |
|
2. Understand core terminology and key aspects of cyber security. |
2.1 Define core terminology used in cyber security. 2.2 Compare typical behaviours of good actors and bad actors. 2.3 Discuss key sectors that are most vulnerable to a cyber-attack. |
Penetration testing (pen testing):process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access.
manufacturing, finance, government and defence agencies/departments, educational institutions, utilities, maritime, IT, healthcare, retailers, |
|
3. Understand cyber threat intelligence. |
3.1 Identify key concepts of cyber threat intelligence 3.2 Explain the following terms in relation to cyber security:
|
|
|
3.3 Identify improvements to secure a network against cyber attacks. |
dark web intelligence
Exploits against client applications also exist, usually |
|
|
|
consisting of modified servers that send an exploit if accessed with a client application.
Service (DDoS), virus.
biometric measures (particularly for mobile devices), password systems, CAPTCHA (or similar), using email confirmations to confirm a user’s identity, automatic software updates. 1.1 Describe the concepts of cyber security. |
Assessment
To achieve a ‘pass’ for this unit, learners must provide evidence to demonstrate that they have fulfilled all the learning outcomes and meet the standards specified by all assessment criteria.
|
Learning Outcomes to be met |
Assessment criteria to be covered |
Type of assessment |
Word count (approx. length) |
|
All 1 to 3 |
All AC under LO 1 to 3 |
Coursework |
3000 words |
Indicative Reading list
- Easttom, C. (2016) Computer Security Fundamentals. 3rd ed. Pearson
- Kizza, J. (2015) Guide to Computer Network Security. 3rd ed. Springer
- Geetha, S. & Phamila, A. (2016) Combating Security Breaches and Criminal Activity in the Digital Sphere. Hershey