{"id":146,"date":"2025-08-26T09:47:07","date_gmt":"2025-08-26T08:47:07","guid":{"rendered":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/?page_id=146"},"modified":"2025-08-26T09:47:08","modified_gmt":"2025-08-26T08:47:08","slug":"the-cyber-resilience-toolkit","status":"publish","type":"page","link":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/the-cyber-resilience-toolkit\/","title":{"rendered":"The Cyber Resilience Toolkit"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>This toolkit aims to provide educators with clear guidance on teaching cyber resilience and internet safety. The sections below deal with specific contexts and the risks and strategies to teach learners about them.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-30cd009e wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2023\/12\/14\/social-media-feeds\/\">Social Media Feeds<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2023\/12\/14\/social-media-messaging\/\">Social Media Messaging<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2023\/12\/14\/cyber-resilience-toolkit-gaming-streaming-and-videos\/\">Streaming &amp; Videos<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2024\/08\/02\/cyber-resilience-toolkit-gaming\/\">Gaming<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><br>Risk is the potential of something bad happening (<a href=\"https:\/\/dictionary.cambridge.org\/dictionary\/english\/risk\">Cambridge Dictionary)<\/a>\u00a0\u2013 we classify internet risks as:<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearnscot25\/uploads\/sites\/10871\/2025\/08\/26093511\/image-2hWc56qe65HBnef6BzkHaezzR6Vx5A.png\" alt=\"\" class=\"wp-image-148\" style=\"width:155px;height:auto\" srcset=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearnscot25\/uploads\/sites\/10871\/2025\/08\/26093511\/image-2hWc56qe65HBnef6BzkHaezzR6Vx5A.png 1024w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearnscot25\/uploads\/sites\/10871\/2025\/08\/26093511\/image-2hWc56qe65HBnef6BzkHaezzR6Vx5A-300x300.png 300w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearnscot25\/uploads\/sites\/10871\/2025\/08\/26093511\/image-2hWc56qe65HBnef6BzkHaezzR6Vx5A-150x150.png 150w, https:\/\/blogs.glowscotland.org.uk\/glowblogs\/public\/digilearnscot25\/uploads\/sites\/10871\/2025\/08\/26093511\/image-2hWc56qe65HBnef6BzkHaezzR6Vx5A-768x768.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2023\/02\/16\/cyber-toolkit-consume\/\">Consume<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2023\/02\/16\/cyber-toolkit-create\/\">Create\u00a0<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearn\/2023\/02\/16\/cyber-toolkit-communicate\/\">Communicate<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Educators should support learners to understand and manage these risks by being able to:<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>setup and account or device<\/li>\n\n\n\n<li>manage the account or device settings, such as who can see posts or messages<\/li>\n\n\n\n<li>report problems with other suers, such as unwanted contact<\/li>\n<\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Consumption risks relate to the learner accessing content created by someone else. This can include text, online posts, games, videos, photos or audio. YouTube and TikTok are the common forms of video consumption. Social media platforms, such as Instagram, are more common for viewing posts.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The potential harm of inappropriate content is learners seeing, hearing or playing content that may not be appropriate for their age, such as violence, swearing or sexual imagery.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Creation risks relate to the learner creating content on their device. This could be any type of media but is most commonly video and photo. Almost any modern device has a camera to record video and capture images and these can be shared easily on apps such as Whatsapp, TikTok and Instagram.&nbsp;<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The potential harm of creating content is closely linked to the risk of communication, when it is shared, and the threat of child sexual exploitation.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Creation risks relate to the learner creating content on their device. This could be any type of media but is most commonly video and photo. Almost any modern device has a camera to record video and capture images and these can be shared easily on apps such as Whatsapp, TikTok and Instagram.&nbsp;<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The potential harm of communication is the impact of someone else\u2019s behaviour on the learner. Typically this is in the form of cyberbullying but can also be child sexual exploitation.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This toolkit aims to provide educators with clear guidance on teaching cyber resilience and internet safety. The sections below deal with specific contexts and the risks and strategies to teach learners about them. Risk is the potential of something bad happening (Cambridge Dictionary)\u00a0\u2013 we classify internet risks as: Educators should support learners to understand and [&hellip;]<\/p>\n","protected":false},"author":77007,"featured_media":150,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-146","page","type-page","status-publish","has-post-thumbnail","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/wp-json\/wp\/v2\/pages\/146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/wp-json\/wp\/v2\/users\/77007"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/wp-json\/wp\/v2\/comments?post=146"}],"version-history":[{"count":3,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/wp-json\/wp\/v2\/pages\/146\/revisions"}],"predecessor-version":[{"id":151,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/wp-json\/wp\/v2\/pages\/146\/revisions\/151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/wp-json\/wp\/v2\/media\/150"}],"wp:attachment":[{"href":"https:\/\/blogs.glowscotland.org.uk\/glowblogs\/digilearnscot25\/wp-json\/wp\/v2\/media?parent=146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}