DigComp 2.2 English questionnaire

4.1 Protecting devices

Knowledge
I know about measures to protect devices (e.g. password, fingerprints, encryption) and prevent others (e.g. a thief, commercial organisation, government agency) from having access to all data.

very little very much
no choice equals to zero
Knowledge
I know that using different strong passwords for different online services is a way to mitigate the negative effects of an account being compromised (e.g. hacked).

very little very much
no choice equals to zero
Knowledge
I know about the importance of keeping the operating system and applications (e.g. browser) up-to-date, in order to fix security vulnerabilities and protect against malicious software (i.e. malware).

very little very much
no choice equals to zero
Knowledge
I know that a firewall blocks certain kinds of network traffic, aiming to prevent different security risks (e.g. remote logins).

very little very much
no choice equals to zero
Knowledge
I am aware of different types of risks in digital environments, such as identity theft (e.g. someone committing fraud or other crimes using another person’s personal data), scams (e.g. financial scams where victims are tricked into sending money), malware attacks (e.g. ransomware).

very little very much
no choice equals to zero
Skills
I know how to adopt a proper cyber-hygiene strategy regarding passwords (e.g. selecting strong ones difficult to guess) and managing them securely (e.g. using a password manager).

very little very much
no choice equals to zero
Skills
I know how to install and activate protection software and services (e.g. antivirus, anti-malware, firewall) to keep digital content and personal data safer.

very little very much
no choice equals to zero
Skills
I know how to activate two-factor authentication when available (e.g. using one-time passwords, OTP, or codes along with access credentials).

very little very much
no choice equals to zero
Skills
I know how to check the type of personal data an app accesses on one’s mobile phone and, based on that, decides whether to install it and configures the appropriate settings.

very little very much
no choice equals to zero
Skills
I am able to encrypt sensitive data stored on a personal device or in a cloud storage service.

very little very much
no choice equals to zero
Skills
I can respond appropriately to a security breach (i.e. an incident that results in unauthorised access to digital data, applications, networks or devices, the leaking of personal data such as logins or passwords).

very little very much
no choice equals to zero
Attitudes
I weigh the benefits and risks of using biometric identification techniques (e.g. fingerprint, face images) as they can affect safety in unintended ways. If biometric information is leaked or hacked, it becomes compromised and can lead to identity fraud.

very little very much
no choice equals to zero
Attitudes
I am keen to consider some self-protective behaviours such as not using open Wi-fi networks to make financial transactions or online banking.

very little very much
no choice equals to zero
Attitudes
I am vigilant not to leave computers or mobile devices unattended in public places (e.g. shared workplaces, restaurants, trains, car backseat).

very little very much
no choice equals to zero
Use Case Employment scenario
I can protect the corporate Twitter account using different methods (e.g. a strong password, control the recent logins) and show new colleagues how to do it.

very little very much
no choice equals to zero
Use Case Employment scenario
I can detect risks like receiving tweets and messages from followers with false profiles or phishing attempts.

very little very much
no choice equals to zero
Use Case Employment scenario
I can apply measures to avoid them (e.g. control the privacy settings).

very little very much
no choice equals to zero
Use Case Employment scenario
I can also help my colleagues to detect risks and threats while using Twitter

very little very much
no choice equals to zero
Use Case Learning Scenario
I can also help my classmates to detect risks and threat while using the digital learning platform on their tablets (e.g. controlling who can access the files).

very little very much
no choice equals to zero
Use Case Learning Scenario
I can protect information, data and content on my school’s digital learning platform (e.g. a strong password, control the recent logins).

very little very much
no choice equals to zero
Use Case Learning Scenario
I can detect different risks and threats when accessing school’s digital platform and apply measures to avoid them (e.g. how to virus check attachments before downloading).

very little very much
no choice equals to zero