Know and understand minimising the potential danger of using email including an awareness of the potential dangers of opening or replying to an email from an unknown person, an awareness of the risks associated with sending personal identifiable data
Cambridge IGCSE ICT 0417 – Safety and Security: Email
Safety and Security – Email
Why Email Safety Matters
Email is a core communication tool in both personal and professional contexts. Misuse can lead to loss of privacy, identity theft, financial loss, and damage to reputation. Understanding the risks helps learners protect themselves and their organisations.
Potential Dangers of Using Email
Phishing – deceptive messages that appear to be from a trusted source.
Malware – viruses, ransomware or spyware attached to or linked from an email.
Spam – unwanted bulk messages that may contain malicious content.
Social engineering – manipulation to obtain confidential information.
Data interception – emails can be read if not encrypted during transmission.
Risks of Opening or Replying to an Email from an Unknown Person
Malicious attachments – opening can install malware on the device.
Hidden links – clicking may lead to phishing sites that capture login details.
Automatic tracking – some images or links notify the sender that the email has been read.
Reply‑all storms – accidental mass replies can expose your address to many recipients.
Social engineering traps – the sender may try to build trust before requesting sensitive data.
Risks of Sending Personal Identifiable Data (PID) or Images via Email
Personal Identifiable Data includes names, addresses, phone numbers, dates of birth, ID numbers, bank details, and photographs that can identify an individual. Sending such data by email can expose it to:
Unauthorised interception if the email is not encrypted.
Accidental forwarding to unintended recipients.
Storage on servers that may be compromised.
Long‑term retention in inboxes, increasing the chance of future breach.
How to Minimise the Potential Danger of Using Email
Verify the sender – check the email address carefully; look for slight misspellings.
Do not open unexpected attachments – even if the sender appears known, confirm with them via another channel.
Hover over links before clicking to see the true URL.
Use strong, unique passwords and enable two‑factor authentication for email accounts.
Encrypt sensitive emails using built‑in encryption tools or secure file‑sharing services.
Limit the amount of personal data sent – only share what is absolutely necessary.
Delete unnecessary emails promptly and empty the trash folder.
Keep software up to date – email clients, operating systems and anti‑malware tools.
Educate yourself on common phishing tactics – recognise urgency, grammar errors, and requests for money or credentials.
Checklist for Safe Email Use
Action
Why It Is Important
How to Do It
Check sender address
Prevents impersonation
Compare the domain and look for misspellings before opening.
Verify attachments
Stops malware infection
Ask the sender via phone or a separate email if the attachment was expected.
Hover over links
Detects malicious URLs
Move the cursor over the link to view the real address in the status bar.
Use encryption
Protects data in transit
Enable S/MIME or PGP encryption, or use a secure file‑sharing service.
Limit personal data
Reduces exposure if intercepted
Only include necessary information; avoid sending photos of ID documents.
Enable two‑factor authentication
Adds a second layer of security
Activate 2FA through your email provider’s security settings.
Keep software updated
Closes security vulnerabilities
Install updates for the operating system, email client, and anti‑virus software regularly.
Delete unnecessary emails
Reduces data that could be compromised
Regularly purge the inbox and empty the trash folder.
Suggested diagram: Flowchart of safe email handling – from receiving to replying or forwarding, highlighting verification steps and encryption options.