Helping the school community make informed, safer decisions in the digital world.

SpiderBytes
SpiderBytes
  • Sign In

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Courses
  • Content
  • Resources
  • FAQs
  • Contact Us
  • About Us

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Cybersecurity Resources

 Discover an expanding collection of resources to deepen your understanding of the digital and cybersecurity landscape, and explore the concepts covered in our courses in greater detail.

Level 1 Foundations - Awareness and Guided Application

As foundational principles, these concepts are woven into the fabric of modern cybersecurity and therefore recur throughout our curriculum by design. They form the pillars upon which students develop enduring, safe digital practices, during their schooling years and into the future.

The CIA Triad: Confidentiality, Integrity, Availability

Level 1 - Introduction to the CIA Triad

A cybersecurity guiding principle underpinning global security standards. It is referenced in frameworks such as the NIST CSF and ISO27001, alongside our own ISM. While our E8 and ASCS doesn't explicitly mention the CIA, this powerhouse Trio serves as the anchor of modern cybersecurity approaches to protecting systems and data.


Confidentiality: Protecting information from unauthorised access or disclosure. It ensures that personal and sensitive data is only available to approved individuals through controlled access measures.

Integrity: The property of accuracy and completeness. Data integrity is a guard against improper information modification or destruction and ensures information non-repudiation and authenticity.

Availability: ensuring timely and reliable access to and use of information by authorised parties, when they need it.

(Digital) Identity & Access Management - IAM

Level 1 - Introduction to the IAM Framework

IAM is a foundational security framework consisting of policies, processes, and technologies, to ensure authorised users (employees, contractors, devices) securely access the right resources at the right time. It prevents unauthorised access, reduces breach risks, and aids regulatory compliance through centralised identity management. 


While sometimes referred to as Digital Identity and Access Management (DIAM) to emphasise the scope of managing digital identities (users, devices, applications) rather than physical human, Identity is presumed to be digital as the concept was created within the context of Enterprise IT and Cybersecurity, and so the industry standard abbreviation is simply IAM. 

Privacy by Design (PbD)

Level 1 - Introduction to the PbD Principles

Privacy by Design (PbD) is a globally recognised framework that ensures privacy and data protection are built into systems, processes, and technologies from the moment the data exists. Rather than reacting to breaches or privacy failures, PbD promotes proactive, preventative, and a user-centered approach to handling personal information. It contains seven core elements:

  1. Proactive, Not Reactive: Anticipate and prevent privacy risks before they occur.
  2. Privacy as the Default Setting: Personal data is automatically protected and individuals should not need to take extra steps to secure their privacy.
  3. Privacy Embedded into Design: Privacy is integrated into systems, platforms, and practices as a core function.
  4. Full Functionality - Positive-Sum, Not Zero-Sum: Security, usability, and innovation can coexist without unnecessary trade-offs.
  5. End-to-End Security: Information is protected throughout its entire lifecycle from  collection to storage to deletion.
  6. Visibility and Transparency
    Systems and practices are open, accountable, and independently verifiable.
  7. Respect for User Privacy
    Individuals’ interests are prioritised through clear communication, appropriate controls, and meaningful choice.

These elements are seen in contemporary privacy governance frameworks worldwide. They form part of privacy protections under what is one of the most robust legal frameworks globally, the European Union's GDPR (Article 25 - Data Protection by Design and By Default). For us in Australia, the PbD principles are currently a recommended approach by the OAIC and the ASD's ACSC.

Digital Citizenship

Level 1 - Introduction to Responsible Digital Citizenship

Foundational Concepts - Level 1

 These learning areas build upon Level 1 outcomes by strengthening judgement, expanding context, and exploring more nuanced cybersecurity risks.

CIA Triad - Extended Pillars

Level 2 - Extended Pillars of the CIA Triad

While the CIA triad forms the core of information security, two additional pillars have become increasingly important in modern cybersecurity: Authenticity and Non-repudiation. These extended pillars complement the CIA triad, providing a more comprehensive framework for protecting information assets.


Authenticity: The property that an entity is what it claims to be. In plain English, authenticity basically means that a person or system is who it says it is, and not some impostor. When data is authentic, it means that we have verified that it was actually created, sent, or otherwise processed by the entity who claims responsibility for the action.Authenticity is crucial in today's digital environment where identity theft and impersonation are common threats. It ensures that the origin of data or the identity of a user can be verified and trusted.


Non-repudiation: The ability to prove the occurrence of a claimed event or action and its originating entities. In simpler terms, non-repudiation essentially means that someone can't perform an action, then plausibly claim that it wasn't actually them who did it. This principle is particularly important in digital transactions and communications, where it's crucial to have undeniable proof of who performed specific actions.


Intermediate Concepts - Level 3

 These learning areas build upon Level 1 outcomes by strengthening judgement, expanding context, and exploring more nuanced cybersecurity risks.

We’re here to help your school foster safer online habits and digital confidence. Contact us to learn more about our engaging cyber safety workshops for students, or to request resources for teachers and parents. Whether you have a question, need a quote, or want to book a session, our team is ready to support you.

Click here to get in touch!

Copyright © 2026 SpiderBytes - All Rights Reserved.

  • Resources
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept