Skip to content

A NSW Government website

Welcome to the NSW Curriculum website

NSW Curriculum
NSW Education Standards Authority

11–12Enterprise Computing 11–12 Syllabus (2022)

Content

Year 11

Principles of cybersecurity
Understanding privacy and security
  • Explain privacy, trust and freedom of Loading  with respect to people, systems and Loading 

  • Describe privacy and security principles associated with access, storage and permissions used by Loading  to collect and interpret data

  • Investigate how an individual can contribute to maintaining the privacy of their own data

  • Explore security vulnerabilities of Loading  to both an individual and an enterprise

    Including:
    • account access
    • account behaviour
    • hosting platform security
    • identity theft
    • phishing
    • evil twins
  • Describe the attributes of a Loading  breach

    Including:
    • confidentiality of information
    • integrity of information
    • availability of information
    • privacy implications
  • Investigate vulnerabilities exploited by the Loading  involved in a breach, such as the impact on various elements

    Including:
    • data
    • people
    • processes
    • technology
Security awareness
  • Investigate cybercrime threats to an enterprise

    Including:
    • hacking
    • phishing, including smishing
    • scamming
    • bots and botnets
    • employee action causing a vulnerability
  • Research Loading  and software strategies used to protect data

    Including:
    • isolation
    • physical security
    • biometrics
    • password protection, encryption and permissions
    • multi-factor authentication
    • back up and disaster recovery
    • firewalls
    • antivirus and anti-malware
  • Investigate cyber risk management

    Including:
    • implementing a cybersecurity strategy with ongoing training
    • identifying and managing vulnerabilities
    • assessing the impact of a breach
    • controlling damage and loss
  • Assess cyber risk by implementing risk-management strategies using a risk matrix

    Including:
    • internal and external vulnerabilities
    • threat landscape
    • impact of exposure
    • likelihood of exploitation
Cyber law and ethics
  • Explain impacts of cybersecurity breaches on the individual, organisation and society

    Including:
    • financial loss
    • reputational damage
    • operational disruptions
    • legal and regulatory ramifications
  • Identify laws and legislation associated with cybersecurity

  • Explore current and emerging cybercrime threats to an enterprise

Related files