Aims & Outcomes

By the end of this unit you should be able to:-

  1. State common cyber security threats to individuals, businesses and nations.
  2. Describe routine defensive measures to minimise the risks posed by these threats.
  3. Secure a digital device for personal use.

For each outcome, course participants should be able to:-

security fundementals

Outcome 1

State common cyber security threats to individuals, businesses and nations.

  1. State the growth of digital technologies, digital networks and digital data.
  2. State the scale and reasons for the growth of Cyber-Crime.
  3. State the potential motivations of malicious hackers.
  4. Describe common vulnerabilities in digital devices and networks including social engineering techniques.
  5. Describe how these vulnerabilities can be exploited in cyber attacks.
  6. State the potential risks to personal privacy posed by these vulnerabilities.
  7. Use terminology correctly in the context of cyber security threats.
data security

Outcome 2

Describe routine defensive measures to minimise the risks posed by these threats.

  1. Describe the security measures that can be taken to reduce vulnerabilities in terms of actions, devices, procedures or techniques.
  2. Describe personal behaviours that minimise the risk of a successful attack.
  3. Describe the ways in which attacks can be detected.
  4. Describe the ways in which individuals and organisations can respond to attacks.
  5. Describe contemporary legislation relating to the protection of data, computer systems and personal privacy.
  6. Use the proper terminology in the context of cyber security defence.
digital forensics

Outcome 3

Secure a digital device for personal use.

  1. Identify the hardware and the software security features in personal digital devices.
  2. Identify the types of vulnerabilities in personal digital devices.
  3. Identify defensive measures to minimise the risk of an attack on personal digital devices.
  4. configure the security features in personal digital devices.
  5. Test the security of personal digital devices.
What is Data? What is Information?
Data as Numbers

Data can be any character including text, words, numbers, pictures, video or even sound in raw random order.

By itself, data is a meaningless collection of facts. For example what does the following mean?

  • Science
  • 42
  • 14
  • Lochaber
  • Fort William
  • 91
  • Drive
  • John

We could have a guess as to what the facts might mean, but we have no way of knowing for sure until they are given some structure and context, at which point it becomes information.

Processed Data

Information is data after its been processed and put into context. For example, the data in the next column becomes easily understandable once placed into a school context:-

John, aged 14, from 42 Lochaber Drive in Fort William scored 92% in his Science test.

Data Funnel
Difference between Data and Information
  • Data is stored as raw facts encoded as a series 0's and 1's in binary code: Computers need data.
  • Information is data that has been processed into a context and given structure: Humans need information.
  • With information comes knowledge and decisions can be made.
1. Setting Up OneNote

We are going to be using OneNote for recoding notes, storing screen shots, links to videos and documents used throughout the course. It comes as part of your Office download. You can also download it as a free app and it can work on PC's, Mac's and on Android devices. It can also be used on line as part of your on-line Glow apps.

Think of it like the jotter or notebook used in your other subjects. But it's so much more than that. Watch and work along with the video to get used to how it works. Make sure you practice so that you become really familiar with how to use it.

Remember, this course is not about how to use OneNote. It's up-to you to learn how to use it and there are plenty of online videos to show you how. And of course, you can always watch this one again!

2. Getting Microsoft Office

Sorry folks, this free download is only available to Renfrewshire pupils registered in Glow.

For homework download a free copy of Microsoft Office (if you haven't already got one) from your Glow launch pad. It comes with a license allowing you to install Office on 5 machines. So its a really good deal. The package includes Word, PowerPoint, Excel, OneNote, Outlook and others.


To get your copy:-

  1. Log into Glow.
  2. In the launch pad, click on the Add button.
  3. Choose App from Library.
  4. Near the top left, choose My Establishment's Apps.
  5. Look for The icon and click on it. Choose Add to Launch Pad
  6. In your launch pad click to start the download process. Make sure confirm you're eligible for educational license and use your Glow Email address.

Then sit back, watch some funny cat videos while it downloads - it will take some time. If you are asked about accounts, make sure you use your Glow user-name and Glow email address as necessary.

Repeat for up-to 4 further devices, if you want.

The more observant amongst you will notice the task titles. Yes! You've guessed it, you're taking a course that comes with its own sound track. Cyber-security, the course that never stops giving.

1. Begin the Begin

It is possible to have as many note books as you'd like in OneNote. But, if you haven't already done so:

  1. Create a new notebook. Call it Cyber-security
  2. Within the notebook, Create a section for each of the units in the course.
  3. Within the Security Fundamentals section, create a page for "Data and Information".
  4. Watch the summary video and make a list of differences between data and information..
  5. Provide 5 examples of data and then give a context to show how they represent information.
  6. Discover and provide a few sentences explaining the difference between information and knowledge.
  7. Check your answers with a friend and correct if necessary.
You should be able to:-
  • Create notebooks within OneNote.
  • Create sections or 'chapters' within a notebook and create and name pages within each section.
  • Make the distinction between Data and Information.
  • Provide examples of where data becomes information.
  • Provide examples of personal data.

If you don't feel confident in meeting any of these performance criteria, ask your teacher or re-read the information again.

Cyber Security

  • Security Fundamentals
  • Data Security
  • Digital Forensics
  • Ethical Hacking
Supporting courses by the SQA Logo
css badge
html badgee