11–12Enterprise Computing 11–12 Syllabus
The new Enterprise Computing 11–12 Syllabus (2022) is to be implemented from 2024.
2024, Term 1
- Start teaching new syllabus for Year 11
- Start implementing new Year 11 school-based assessment requirements
- Continue to teach the Information Processes and Technology Stage 6 Syllabus (2009) for Year 12
2024, Term 4
- Start teaching new syllabus for Year 12
- Start implementing new Year 12 school-based assessment requirements
2025
- First HSC examination for new syllabus
Content
Year 11
Explain privacy, trust and freedom of information with respect to people, systems and data
Describe privacy and security principles associated with access, storage and permissions used by enterprises to collect and interpret data
Investigate how an individual can contribute to maintaining the privacy of their own data
Explore security vulnerabilities of social networking to both an individual and an enterprise
Including:- account access
- account behaviour
- hosting platform security
- identity theft
- phishing
- evil twins
Describe the attributes of a cybersecurity breach
Including:- confidentiality of information
- integrity of information
- availability of information
- privacy implications
Investigate vulnerabilities exploited by the threat actor involved in a breach, such as the impact on various elements
Including:- data
- people
- processes
- technology
Investigate cybercrime threats to an enterprise
Including:- hacking
- phishing, including smishing
- scamming
- bots and botnets
- employee action causing a vulnerability
Research hardware and software strategies used to protect data
Including:- isolation
- physical security
- biometrics
- password protection, encryption and permissions
- multi-factor authentication
- back up and disaster recovery
- firewalls
- antivirus and anti-malware
Investigate cyber risk management
Including:- implementing a cybersecurity strategy with ongoing training
- identifying and managing vulnerabilities
- assessing the impact of a breach
- controlling damage and loss
Assess cyber risk by implementing risk-management strategies using a risk matrix
Including:- internal and external vulnerabilities
- threat landscape
- impact of exposure
- likelihood of exploitation
Explain impacts of cybersecurity breaches on the individual, organisation and society
Including:- financial loss
- reputational damage
- operational disruptions
- legal and regulatory ramifications
Identify laws and legislation associated with cybersecurity
Explore current and emerging cybercrime threats to an enterprise