Know and understand minimising the potential danger of using the internet including only using trusted websites recommended by teachers, using a search engine that only allows access to age appropriate websites
Topic 8 – Safety and Security (ICT 0417)
Learning Objectives
Identify the range of potential dangers when using the Internet, email, social media, online games and ICT equipment.
Explain how legislation, school policies and technical tools help to minimise those dangers.
Use only teacher‑approved, trusted web sites and an age‑appropriate search engine.
Apply safe‑working practices – strong passwords, secure connections, reporting procedures and basic ICT skills such as file‑management and validation checks.
1. Why e‑Safety Matters
The Internet gives instant access to information and communication, but it also creates risks that can affect personal data, reputation and well‑being.
Malware, viruses and ransomware – can corrupt or lock data.
Inappropriate or harmful content – may be distressing or illegal.
Open Chrome Settings ► Privacy and security ► Site Settings.
Click Additional content settings ► SafeSearch.
Toggle Force SafeSearch to On.
Ask your teacher to lock the setting via the school’s admin console.
5. Safe Working Practices (Passwords, Connections, Reporting)
5.1 Password‑Strength Rubric (AO3)
Score
Criteria
1 – Weak
≤ 7 characters, only letters or only numbers.
2 – Moderate
8–10 characters, mix of upper‑ and lower‑case letters.
3 – Strong
≥ 12 characters, includes upper‑case, lower‑case, numbers and symbols.
4 – Very Strong
≥ 16 characters, no dictionary words, uses a pass‑phrase or password manager.
All school accounts must meet at least a Score 3 – Strong rating and be changed every 90 days.
5.2 Two‑Factor Authentication (2FA)
First factor: password.
Second factor: code sent to a registered mobile device or generated by an authenticator app.
2FA is mandatory for the school portal, email and any cloud storage used for coursework.
5.3 Secure Connections
Always check for https:// and the padlock icon before entering any data.
Never submit personal information on a site that shows “Not Secure”.
5.4 Reporting Procedure
Do not interact with the suspicious content.
Take a screenshot (Ctrl + Shift + S).
Send the screenshot to your teacher via the school email or the designated reporting form.
Log the incident in the class “e‑Safety Log” for follow‑up.
6. Threats and Corresponding Protection Mechanisms (AO2)
Threat
Description
Mitigation Tool(s) & How They Help
Malware / Virus
Software that damages, steals or encrypts data.
Antivirus & anti‑malware scanners – detect and quarantine malicious files before they run.
Ransomware
Encrypts files and demands payment.
Regular backups on the school drive + file‑encryption – restores clean copies without paying.
Phishing (email)
Fake messages asking for passwords or personal data.
Spam filters + user training – flag suspicious senders; 2FA limits damage if credentials are leaked.
Pharming
Redirects a legitimate URL to a fraudulent site.
DNS filtering & SSL/TLS – ensures the address you type resolves to the correct server and shows a valid certificate.
Smishing / Vishing
Phishing via SMS or voice call.
Awareness training + never entering credentials on links received by text/phone.
Card fraud
Unauthorised use of payment details.
Virtual card numbers & secure payment gateways; school policy forbids entering payment data on non‑school sites.
Hacking (unauthorised access)
Attackers gain control of accounts or systems.
Strong passwords, 2FA, firewalls and regular patching – raise the barrier to entry.
7. Safe Practices for Specific Online Activities
7.1 Internet & Search Engines
Only use the school‑filtered search engine.
Stay on teacher‑approved sites; avoid “click‑bait” links.
Never bypass filters or use a private/incognito window without permission.
7.2 Email
Check the sender’s address – look for miss‑spelled domains.
Do not open unexpected attachments or click unknown links.
Use the school‑provided password + 2FA.
Report any suspicious mail to the teacher immediately.
7.3 Social Media (where school policy permits)
Set profiles to private and limit friend/follower lists.
Never share personal or sensitive data (address, phone number, school timetable).
Use the platform’s Report function for bullying, harassment or inappropriate content.
Remember: anything posted online can be saved and re‑shared.
7.4 Online Gaming
Play under a pseudonym – never use your real name.
Do not share personal details or financial information in chat rooms.
Enable parental‑control or age‑restriction settings provided by the game.
Report abusive players or suspicious links to the game moderator and to your teacher.
8. Copyright & Intellectual Property
8.1 What Can I Use? – Decision Tree
Is the material in the public domain (e.g., works published before 1925)? → Yes → Free to use, no attribution required.
No → Does it have a Creative Commons (CC) licence?
CC‑BY or CC‑BY‑SA → Use with proper attribution.
CC‑BY‑NC, CC‑BY‑ND, etc. → Check the specific conditions (non‑commercial, no‑derivatives).
No → Is it covered by fair dealing for education (short excerpt, citation, non‑commercial)? → Yes → Use with attribution and keep the excerpt short.
No → Seek permission from the rights holder or find an alternative source.
8.2 Giving Proper Attribution (APA‑style example)
Author, A. A. (Year). Title of work. Publisher. URL (if online)
For Creative Commons: Author (Year). Title. CC‑BY licence. URL
8.3 Using School‑Approved Resources
All images, videos and text from the approved‑site list are pre‑checked for licensing.
When in doubt, ask the teacher or use the school’s “Media Repository”.
9. Audience Awareness & Ethical Use (AO3)
Choosing the right tone, language and content for the intended audience is a key assessment objective.
9.1 Case Study – School Blog vs Public Forum
Aspect
School Blog (internal)
Public Forum (external)
Audience
Peers, teachers, parents – known community.
Anyone on the internet – unknown audience.
Content
Project updates, class news – can include photos of classmates with consent.
General advice or opinion – must avoid personal details.
Tone
Friendly, supportive, school‑appropriate.
More formal, neutral, and careful about privacy.
Legal/Ethical
School policy governs posting; consent forms required for images.
Strictly no personal data; must respect copyright and defamation laws.
9.2 Audience‑Suitability Checklist
Is the language appropriate for the age and knowledge level of the readers?
Have I removed any personal or sensitive information that isn’t needed?
Does the tone match the purpose (informative, persuasive, reflective)?
Have I cited all sources correctly?
10. Practical ICT Skills Linked to Safety
10.1 File Management & Back‑ups
Save work to the school cloud drive (e.g., Google Drive for Education) – it is automatically backed up.
Use a clear naming convention: SubjectYearTopicVersionDate (e.g., Biology2026CellStructurev20260103).
Keep at most three versions; delete older drafts to avoid clutter.
10.2 Proofing & Validation Checks
Check spelling and grammar with the built‑in editor.
Validate sources: author, date, publisher, URL, and whether the site is on the approved list.
Use the “Plagiarism Checker” provided by the school to ensure originality.
11. Student Checklist – Before Clicking a Link
Log in with your school‑provided account only.
Verify the URL:
Starts with https://
Domain ends with .gov, .edu, .org or the school’s domain.
Look for the padlock icon – confirms a secure SSL/TLS connection.
Confirm the site appears on the teacher‑approved list (refer to the class resource sheet).
Check that there are no pop‑up ads, download prompts or requests for personal data.
Make sure you are using the age‑appropriate search engine with SafeSearch locked.
Enter a strong password (≥ 12 characters, mix of cases, numbers, symbols) and enable 2FA where available.
Do not share personal or sensitive data unless the teacher explicitly requires it.
If anything looks suspicious, report immediately to your teacher.
When finished, log out and close the browser window.
12. Teacher Responsibilities
Compile and regularly update a list of approved websites; explain why each is safe.
Configure all school computers to open the school‑filtered search engine as the default homepage.
Demonstrate how to recognise a secure connection, identify phishing attempts and set strong passwords.
Monitor internet usage via the school firewall or content‑filter logs and intervene when unsafe behaviour is detected.
Teach the basics of copyright, Creative Commons licences and ethical publishing.
Provide a clear reporting procedure for students to flag inappropriate content or security incidents.
Integrate file‑management, proof‑reading and validation checks into practical ICT tasks.
13. Summary Self‑Assessment Checklist (Student)
☐
Action
Using a teacher‑approved website.
URL begins with https:// and shows a padlock.
Search engine is locked in age‑appropriate (SafeSearch) mode.
No personal or sensitive data entered unless the task requires it.
Strong password used (Score ≥ 3) and, where possible, two‑factor authentication enabled.
Any suspicious content or behaviour reported to the teacher.
Files saved with a clear naming convention and backed up on the school drive.
All sources cited correctly and checked against the approved‑site list.
Suggested diagram: Flowchart – “Before clicking a link” → Check URL → Verify padlock → Confirm site on approved list → No pop‑ups/downloads → Click safely.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.