DigComp 2.2 English questionnaire
4.1 Protecting devices
Knowledge
I know about measures to protect devices (e.g. password, fingerprints, encryption) and prevent others (e.g. a thief, commercial organisation, government agency) from having access to all data.
Knowledge
I know that using different strong passwords for different online services is a way to mitigate the negative effects of an account being compromised (e.g. hacked).
Knowledge
I know about the importance of keeping the operating system and applications (e.g. browser) up-to-date, in order to fix security vulnerabilities and protect against malicious software (i.e. malware).
Knowledge
I know that a firewall blocks certain kinds of network traffic, aiming to prevent different security risks (e.g. remote logins).
Knowledge
I am aware of different types of risks in digital environments, such as identity theft (e.g. someone committing fraud or other crimes using another person’s personal data), scams (e.g. financial scams where victims are tricked into sending money), malware attacks (e.g. ransomware).
Skills
I know how to adopt a proper cyber-hygiene strategy regarding passwords (e.g. selecting strong ones difficult to guess) and managing them securely (e.g. using a password manager).
Skills
I know how to install and activate protection software and services (e.g. antivirus, anti-malware, firewall) to keep digital content and personal data safer.
Skills
I know how to activate two-factor authentication when available (e.g. using one-time passwords, OTP, or codes along with access credentials).
Skills
I know how to check the type of personal data an app accesses on one’s mobile phone and, based on that, decides whether to install it and configures the appropriate settings.
Skills
I am able to encrypt sensitive data stored on a personal device or in a cloud storage service.
Skills
I can respond appropriately to a security breach (i.e. an incident that results in unauthorised access to digital data, applications, networks or devices, the leaking of personal data such as logins or passwords).
Attitudes
I weigh the benefits and risks of using biometric identification techniques (e.g. fingerprint, face images) as they can affect safety in unintended ways. If biometric information is leaked or hacked, it becomes compromised and can lead to identity fraud.
Attitudes
I am keen to consider some self-protective behaviours such as not using open Wi-fi networks to make financial transactions or online banking.
Attitudes
I am vigilant not to leave computers or mobile devices unattended in public places (e.g. shared workplaces, restaurants, trains, car backseat).
Use Case Employment scenario
I can protect the corporate Twitter account using different methods (e.g. a strong password, control the recent logins) and show new colleagues how to do it.
Use Case Employment scenario
I can detect risks like receiving tweets and messages from followers with false profiles or phishing attempts.
Use Case Employment scenario
I can apply measures to avoid them (e.g. control the privacy settings).
Use Case Employment scenario
I can also help my colleagues to detect risks and threats while using Twitter
Use Case Learning Scenario
I can also help my classmates to detect risks and threat while using the digital learning platform on their tablets (e.g. controlling who can access the files).
Use Case Learning Scenario
I can protect information, data and content on my school’s digital learning platform (e.g. a strong password, control the recent logins).
Use Case Learning Scenario