Know and understand risks of using the internet including inappropriate and criminal material, restricting data through parental, educational and ISP control
Topic 10 – Communication and e‑Safety
Learning Objectives
Identify and explain all components of a correctly formatted email and the security measures that protect it.
Describe the main purposes of the Internet, evaluate its advantages and disadvantages, and differentiate between related terms (Internet, Intranet, Extranet, WWW, HTTP/HTTPS, FTP, SSL/TLS, blogs, wikis, social‑networking sites, cloud services).
Analyse the major e‑safety risks, their impact on individuals and society, and the legal/ethical framework that governs online behaviour.
Evaluate how parental, educational and ISP controls restrict inappropriate or criminal material and protect personal data.
Apply practical skills: compose a safe, correctly formatted email; configure safe‑search; set up basic parental controls; produce evidence with screenshots.
1. Email Communication
1.1 Parts of an email (purpose of each field)
To: primary recipient(s); the message is addressed directly to them.
Cc (Carbon Copy): recipients who need to be informed but are not expected to act.
Bcc (Blind Carbon Copy): recipients hidden from each other – protects privacy and avoids exposing large address lists.
Subject line: a concise summary; helps the receiver decide priority.
Keep file size under the provider’s limit (usually 10‑25 MB). For larger files use cloud‑sharing links.
Scan every attachment with up‑to‑date antivirus software before opening.
When sending a link, set appropriate sharing permissions (view‑only vs. edit).
1.5 Email security and safe‑email practice
Spam: unsolicited bulk messages, often commercial.
Phishing: fraudulent messages that pretend to be from a trusted source to obtain personal data.
Malware attachments: files that install viruses, ransomware or trojans.
Encryption: protects the content of an email while it travels (e.g., S/MIME or PGP). Schools may require encrypted communication for sensitive data.
Digital signatures: verify the sender’s identity and ensure the message has not been altered.
Two‑factor authentication (2FA): adds a second verification step (code sent to phone, authenticator app) for email accounts.
Red flags to watch for:
Poor spelling or grammar.
Urgent or threatening language (“Your account will be closed…”).
Mismatched URLs (hover to view the real address).
Unexpected attachments, especially .exe, .bat, .js.
What to do when you suspect a phishing or spam email:
Do not click any links or open attachments.
Mark the message as spam or report it to your email provider.
If the email appears to be from your school, forward it to the IT support team.
Delete the email after reporting.
2. Effective Use of the Internet
2.1 Common purposes
Research and information gathering.
Communication – email, instant messaging, video‑conferencing.
E‑learning platforms and virtual classrooms.
Entertainment – streaming, gaming, social media.
E‑commerce, online banking and government services.
2.2 Advantages and disadvantages (with evaluation prompts)
Advantage
Disadvantage
Instant access to a vast amount of information.
Information overload; difficulty judging reliability.
Global communication and collaboration in real time.
Risk of mis‑communication, loss of privacy and cultural misunderstand‑ings.
Flexible learning – MOOCs, virtual labs, recorded lessons.
Dependence on reliable connectivity and suitable devices; digital divide.
Convenient online services (banking, shopping, public services).
Exposure to fraud, scams and cyber‑crime.
Platforms for creativity – blogs, wikis, multimedia publishing.
Potential exposure to inappropriate or extremist content.
Evaluation prompts for learners: In a short paragraph, decide which advantage you think outweighs its paired disadvantage for a specific user group (e.g., a secondary‑school student, a small business, a senior citizen). Justify your answer with at least two reasons.
2.3 Key terminology and how the concepts differ
Internet: worldwide network of interconnected computers.
Intranet: private network restricted to an organisation (e.g., a school’s internal staff portal).
Extranet: part of an intranet that external partners can access securely (e.g., a university’s research‑collaboration site for partner institutions).
World Wide Web (WWW): collection of web pages accessed via browsers using HTTP/HTTPS.
HTTP vs. HTTPS:
HTTP – Hypertext Transfer Protocol; data sent in plain text.
HTTPS – HTTP Secure; uses SSL/TLS encryption to protect data in transit (required for online banking, login pages).
FTP (File Transfer Protocol): used to upload/download files to/from a server; often replaced by secure variants (SFTP, FTPS).
SSL/TLS: cryptographic protocols that provide encryption, authentication and data integrity for web traffic.
Browser: software (Chrome, Firefox, Edge, Safari) that retrieves and displays web pages.
Search engine: tool (Google, Bing, DuckDuckGo) that indexes web pages and returns results for user queries.
Blog: regularly updated website where entries appear in reverse‑chronological order; often personal or thematic.
Wiki: collaborative site that allows multiple users to edit content (e.g., Wikipedia, school project wikis).
Social‑networking site: platform for creating personal profiles and interacting with others (Facebook, Instagram, TikTok, LinkedIn).
Cloud service: remote storage or applications delivered over the Internet (Google Drive, Microsoft 365, Dropbox).
2.4 Comparison of common Internet protocols
Protocol
Primary Use
Typical Port
Security
HTTP
Web page transfer (unencrypted)
80
None – data in plain text
HTTPS
Secure web page transfer
443
SSL/TLS encryption
FTP
File upload/download
21 (control), 20 (data)
None – vulnerable to sniffing
SFTP/FTPS
Secure file transfer
22 (SFTP) / 990 (FTPS)
SSH or SSL/TLS encryption
SMTP
Sending email
25
Often combined with STARTTLS for encryption
IMAP/POP3
Retrieving email
143/110 (plain) or 993/995 (SSL)
SSL/TLS when using the secure ports
3. e‑Safety – Risks of Using the Internet
Inappropriate content: violent, sexual, extremist, hate‑speech or self‑harm material.
Email spam filters, anti‑phishing toolbars, user education, 2FA
Students, Teachers, ISP security services
Malware & ransomware
Trojan download from a compromised site
Antivirus/anti‑malware, regular OS updates, restricted admin rights
Parents, School IT department, ISP (network monitoring)
Privacy breaches
Tracking cookies, location data sharing
Browser privacy settings, VPN use, cookie‑consent management, GDPR‑compliant data handling
Users, Educational policy makers, ISP (transparent data policy)
Cyber‑bullying
Harassing messages on a social‑networking site
Monitoring tools, reporting mechanisms, digital‑citizenship lessons, platform‑specific block/report features
Parents, School staff, Platform providers
7. Practical Activities (AO‑2)
Compose a correctly formatted email:
Include To, CC, BCC, Subject, greeting, body, closing, signature and an attachment (PDF).
Check the email against a netiquette checklist (tone, subject relevance, CC/BCC use, attachment safety).
Take a screenshot of the completed email and submit it as evidence.
Configure safe‑search on a school computer:
Open the default browser, navigate to the search‑engine settings and enable “SafeSearch”.
Perform two searches – one with a neutral term, one with an adult‑related term – and record the results.
Capture screenshots before and after enabling SafeSearch and write a brief evaluation of the difference.
Set up a parental‑control filter on a home router (or software alternative):
Log into the router’s admin panel, select a DNS‑filtering service, choose content categories to block, and set a daily time limit.
Document each step with screenshots and write a short guide for a sibling.
Create a mock phishing email:
Design an email that pretends to be from a familiar service (e.g., “Your School Email Account”).
Highlight at least five red‑flag features (misspelt domain, urgent language, fake link, etc.).
Develop a checklist that classmates can use to identify phishing attempts.
Draft an Acceptable Use Policy (AUP) for a school computer lab:
Cover email use, internet browsing, software installation, data protection and consequences of breach.
Include a short section on the responsibilities of pupils, teachers and parents.
Present the AUP to the class and discuss how it aligns with GDPR and the Online Safety Bill.
8. Suggested Diagram
Flowchart showing the interaction between parental controls, school/college controls and ISP controls in filtering Internet content and protecting personal data.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.