Know and understand the causes of these safety issues and strategies for preventing them
Safety and Security (Cambridge IGCSE 0417)
1. Syllabus Objective
Know and understand the causes of safety issues that arise when using information and communication technology (ICT) and the strategies for preventing them, as required by the Cambridge IGCSE 0417 syllabus.
Students work in pairs to complete a classroom risk‑assessment sheet (provided by the teacher). They must identify at least five hazards, rate the risk (low/medium/high), and suggest a corrective action. This activity develops AO3 (analyse/evaluate) skills.
3. Electrical & Fire Hazards
Use surge protectors and never overload sockets.
Inspect cords regularly; replace any that are frayed or damaged.
Ensure all equipment is correctly grounded.
Maintain adequate ventilation around ICT equipment; clean dust from fans, vents and filters on a regular schedule.
Install and maintain smoke detectors and appropriate fire‑extinguishers (CO₂ or dry‑powder for electrical fires).
4. Ergonomic & Health Problems
Adjust chair height so feet rest flat on the floor and knees are at ~90°.
Position the monitor so the top of the screen is at eye level and about an arm’s length away.
Keep the keyboard and mouse at a comfortable height; use wrist rests if needed.
Apply the 20‑20‑20 rule: every 20 minutes look at something ≥20 feet away for at least 20 seconds.
Take short breaks (≈5 minutes) each hour to stretch and rest the eyes.
5. Data Loss – 8.3 (part a)
Accidental deletion – user error or mistaken bulk‑delete.
Install reputable antivirus/anti‑malware software and keep definitions up‑to‑date.
Apply all OS and application patches promptly (regular patch‑management).
Restrict software installation to authorised personnel only.
7. Unauthorised Access & Threats – 8.3 (part b)
7.1 Threats (what can go wrong)
Threat
Typical example
Hacking / brute‑force attacks
Attempting to guess passwords to gain admin rights.
Phishing, smishing, vishing
Fake email asking for login details.
Insider threat
Employee copies confidential data onto a USB stick.
Social engineering (shoulder surfing, key‑logging)
Someone watches a user type a password.
Pharming & card‑fraud
Redirecting users to a counterfeit banking site.
7.2 Protective Controls (what we do about it)
Control
How it mitigates the threat
Strong password policy
Reduces success of brute‑force attacks.
Multi‑factor authentication (MFA)
Even if a password is stolen, an additional factor is required.
Principle of least privilege
Limits damage from insider or compromised accounts.
Firewalls (hardware/software)
Filters unwanted inbound/outbound traffic.
Security awareness training
Helps users recognise phishing, shoulder surfing, etc.
Digital certificates & SSL/TLS
Ensures the identity of web services and encrypts data in transit.
Biometric controls (where appropriate)
Provides an additional, hard‑to‑replicate factor.
8. Privacy & Data‑Protection Legislation – 8.3 (part c)
8.1 Why legislation exists
Data‑protection laws ensure that personal data is processed lawfully, fairly and transparently. They protect individuals from unauthorised use, limit how long data can be kept, and require organisations to keep data secure. This reduces the risk of privacy breaches, identity theft and loss of public trust.
8.2 Core principles (GDPR‑style) with everyday ICT examples
Principle
Everyday ICT example
Lawfulness, fairness & transparency
Providing a clear privacy notice when students register for an online learning platform.
Purpose limitation
Collecting student email addresses only for class communication, not for marketing.
Data minimisation
Storing only the name and grade of a pupil, not unnecessary medical details.
Accuracy
Regularly updating contact details in the school database.
Storage limitation
Deleting archived project files after the end of the school year.
Integrity & confidentiality
Encrypting exam results before sending them to parents.
Accountability
Keeping a log of who accessed student records and when.
Rights of the data subject
Allowing a pupil to request a copy of their stored personal data.
8.3 Technical safeguards
Encryption at rest (e.g., AES‑256 for USB drives) and in transit (TLS/SSL).
Regular backups stored securely and tested for restoration.
9. e‑Safety – 8.2
9.1 Mapping syllabus sub‑points to practical advice
Syllabus sub‑point
Key safe‑internet practice
Internet use
Browse only approved sites; use HTTPS; avoid downloading from unknown sources; enable pop‑up blockers.
Email
Check sender address; never open unexpected attachments; verify links before clicking; report suspicious mail.
Social media
Set profiles to “private”; think before posting; use strong passwords; recognise social‑engineering attempts.
Online gaming
Limit daily playtime; use parental controls; keep gaming accounts protected with strong passwords and MFA; beware of in‑game scams and “loot‑box” purchases.
9.2 Case‑study activity (AO2/AO3)
Scenario: Emma receives an email that appears to be from her school’s IT department. It says, “Your account will be locked unless you verify your password now.” The email contains a link that looks legitimate.
Task for students:
Identify at least three red‑flags in the email (e.g., urgent language, mismatched URL, unknown sender).
Explain why clicking the link could be dangerous (phishing, credential theft).
Suggest the correct action Emma should take (report to teacher/IT, do not click, verify via official channel).
Copyright – Only use software, images, music and video that you have a licence for; give proper attribution where required.
Software piracy is illegal and can lead to fines, loss of data integrity, and security vulnerabilities.
Audience appreciation – Tailor digital content to the needs, expectations and cultural background of the intended audience.
Data‑protection legislation – Process personal data in line with the principles listed in section 8.2.
11. Recommended Safety Procedures (AO1)
Carry out a comprehensive ICT risk assessment at least once a year (include physical, electrical, ergonomic and security risks).
Develop, display and review a written ICT safety policy; ensure it covers physical safety, e‑safety, data protection and emergency procedures.
Provide induction training for new users and refresher sessions for existing staff covering:
Physical safety and ergonomics
Backup and recovery
Malware protection and patch management
Strong passwords, MFA and least‑privilege access
e‑Safety guidelines and reporting procedures
Maintain an incident‑reporting system for accidents, near‑misses, security breaches and e‑Safety incidents.
Schedule routine maintenance checks for hardware, software, power supplies and physical infrastructure.
Test backup and recovery processes quarterly; verify that restores are successful.
Review and update security measures (firewalls, antivirus, password policies) whenever new threats emerge.
Run periodic e‑Safety awareness campaigns (e.g., “Think Before You Click”, “Spot the Phish”).
12. Summary Checklist (Quick self‑audit)
Are workstations ergonomically set up (chair, monitor, keyboard, lighting)?
Are cables secured, outlets not overloaded, and heavy equipment stable?
Is antivirus/anti‑malware software active and up‑to‑date?
Are strong passwords and multi‑factor authentication in use?
Is data regularly backed up, stored securely and tested for restoration?
Are fire safety devices (smoke detectors, extinguishers) functional and inspected?
Is staff trained on safe ICT practices, e‑Safety and data‑protection legislation?
Are firewalls, digital certificates and encryption deployed where required?
Is there a clear, written policy for internet, email, social‑media and online gaming use?
Suggested diagram: Flowchart showing the relationship between causes of safety issues, preventive strategies, and outcomes (reduced risk, improved productivity).
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.