Please enable JavaScript.
Coggle requires JavaScript to display documents.
Unit 4 - Topic 1 - Coggle Diagram
Unit 4 - Topic 1
recognise and describe
encryption and authentication strategies appropriate for securing data transmissions and their differences
features of symmetric (Data Encryption Standard — DES, Triple DES, AES — Advanced Encryption Standard, Blowfish and Twofish) and assymetric (RSA) encryption algorithms
how data compression, encryption and hashing are used in the storage and transfer of data
how simple algorithms consist of input, process and output at various stages
how useability principles are used to inform solution development
how the elements and principles of visual communication inform user interface development
explain
Australian Privacy Principles (2014) and ethics applicable to the use of personally identifiable or sensitive data from a digital systems perspective
network transmission principles, including latency, jitter, guarantee and timeliness of delivery, and protocols relevant to the transmission of data over the internet, e.g. HTTP, HTTPS, FTP, VPN, streaming and broadcasting data packets
methods for data exchange used to transfer data across networked systems including REST, JSON and XML
symbolise and explain
how application sub-systems, e.g. front end, back end, work together to constitute a solution
secure data transmission techniques and processes, including the use of encryption, decryption, authentication, hashing and checksums
the basic constructs of an algorithm, including assignment, sequence, selection, condition, iteration and modularisation
symbolise
representations of a digital solution
data flow through a system using data flow diagrams.
symbolise, analyse and evaluate Caesar, Polyalphabetic (e.g. Vigenere and Gronsfield), and •one-time pad encryption algorithm
describe data using appropriate naming conventions, data formats and structures