Unit | Learning Outcome | Title | Pages |
---|---|---|---|
R012 | LO4.1 | Types of threats | 59-63 |
R012 | LO4.2 | The vulnerabilities that can be exploited in a cyber-security attack | 63-68 |
R012 | LO4.3 | The impacts and consequences of a cyber-security attack | 68-73 |
R012 | LO4.4 | Prevention measures | 73-79 |
R012 | LO4.5 | Current relevant IT Legislation, its implications and applications | 79-84 |
R012 | LO4.6 | The importance of validity, reliability and bias when collecting and using data and information | 84-86 |