Skip to content

A NSW Government website

Welcome to the NSW Curriculum website

NSW Curriculum
NSW Education Standards Authority

11–12Enterprise Computing 11–12 Syllabus

Record of changes
Implementation from 2024
Expand for detailed implementation advice

Content

Year 11

Principles of cybersecurity
Understanding privacy and security
  • Explain privacy, trust and freedom of information with respect to people, systems and data

  • Describe privacy and security principles associated with access, storage and permissions used by enterprises to collect and interpret data

  • Investigate how an individual can contribute to maintaining the privacy of their own data

  • Explore security vulnerabilities of social networking to both an individual and an enterprise

    Including:
    • account access
    • account behaviour
    • hosting platform security
    • identity theft
    • phishing
    • evil twins
  • Describe the attributes of a cybersecurity breach

    Including:
    • confidentiality of information
    • integrity of information
    • availability of information
    • privacy implications
  • Investigate vulnerabilities exploited by the threat actor involved in a breach, such as the impact on various elements

    Including:
    • data
    • people
    • processes
    • technology
Security awareness
  • Investigate cybercrime threats to an enterprise

    Including:
    • hacking
    • phishing, including smishing
    • scamming
    • bots and botnets
    • employee action causing a vulnerability
  • Research hardware and software strategies used to protect data

    Including:
    • isolation
    • physical security
    • biometrics
    • password protection, encryption and permissions
    • multi-factor authentication
    • back up and disaster recovery
    • firewalls
    • antivirus and anti-malware
  • Investigate cyber risk management

    Including:
    • implementing a cybersecurity strategy with ongoing training
    • identifying and managing vulnerabilities
    • assessing the impact of a breach
    • controlling damage and loss
  • Assess cyber risk by implementing risk-management strategies using a risk matrix

    Including:
    • internal and external vulnerabilities
    • threat landscape
    • impact of exposure
    • likelihood of exploitation
Cyber law and ethics
  • Explain impacts of cybersecurity breaches on the individual, organisation and society

    Including:
    • financial loss
    • reputational damage
    • operational disruptions
    • legal and regulatory ramifications
  • Identify laws and legislation associated with cybersecurity

  • Explore current and emerging cybercrime threats to an enterprise

Related files