Know and understand minimising the potential danger of using email including an awareness of the potential dangers of opening or replying to an email from an unknown person, an awareness of the risks associated with sending personal identifiable data

Published by Patrick Mutisya · 8 days ago

Cambridge IGCSE ICT 0417 – Safety and Security: Email

Safety and Security – Email

Why Email Safety Matters

Email is a core communication tool in both personal and professional contexts. Misuse can lead to loss of privacy, identity theft, financial loss, and damage to reputation. Understanding the risks helps learners protect themselves and their organisations.

Potential Dangers of Using Email

  • Phishing – deceptive messages that appear to be from a trusted source.
  • Malware – viruses, ransomware or spyware attached to or linked from an email.
  • Spam – unwanted bulk messages that may contain malicious content.
  • Social engineering – manipulation to obtain confidential information.
  • Data interception – emails can be read if not encrypted during transmission.

Risks of Opening or Replying to an Email from an Unknown Person

  1. Malicious attachments – opening can install malware on the device.
  2. Hidden links – clicking may lead to phishing sites that capture login details.
  3. Automatic tracking – some images or links notify the sender that the email has been read.
  4. Reply‑all storms – accidental mass replies can expose your address to many recipients.
  5. Social engineering traps – the sender may try to build trust before requesting sensitive data.

Risks of Sending Personal Identifiable Data (PID) or Images via Email

Personal Identifiable Data includes names, addresses, phone numbers, dates of birth, ID numbers, bank details, and photographs that can identify an individual. Sending such data by email can expose it to:

  • Unauthorised interception if the email is not encrypted.
  • Accidental forwarding to unintended recipients.
  • Storage on servers that may be compromised.
  • Long‑term retention in inboxes, increasing the chance of future breach.

How to Minimise the Potential Danger of Using Email

  • Verify the sender – check the email address carefully; look for slight misspellings.
  • Do not open unexpected attachments – even if the sender appears known, confirm with them via another channel.
  • Hover over links before clicking to see the true URL.
  • Use strong, unique passwords and enable two‑factor authentication for email accounts.
  • Encrypt sensitive emails using built‑in encryption tools or secure file‑sharing services.
  • Limit the amount of personal data sent – only share what is absolutely necessary.
  • Delete unnecessary emails promptly and empty the trash folder.
  • Keep software up to date – email clients, operating systems and anti‑malware tools.
  • Educate yourself on common phishing tactics – recognise urgency, grammar errors, and requests for money or credentials.

Checklist for Safe Email Use

ActionWhy It Is ImportantHow to Do It
Check sender addressPrevents impersonationCompare the domain and look for misspellings before opening.
Verify attachmentsStops malware infectionAsk the sender via phone or a separate email if the attachment was expected.
Hover over linksDetects malicious URLsMove the cursor over the link to view the real address in the status bar.
Use encryptionProtects data in transitEnable S/MIME or PGP encryption, or use a secure file‑sharing service.
Limit personal dataReduces exposure if interceptedOnly include necessary information; avoid sending photos of ID documents.
Enable two‑factor authenticationAdds a second layer of securityActivate 2FA through your email provider’s security settings.
Keep software updatedCloses security vulnerabilitiesInstall updates for the operating system, email client, and anti‑virus software regularly.
Delete unnecessary emailsReduces data that could be compromisedRegularly purge the inbox and empty the trash folder.

Suggested diagram: Flowchart of safe email handling – from receiving to replying or forwarding, highlighting verification steps and encryption options.