Please enable JavaScript.
Coggle requires JavaScript to display documents.
Research and Investigation - Coggle Diagram
Research and Investigation
Data Exchange
Security Prevention Methods
Authentication Methods
Authentication methods do not assist with the confidentiality, integrity and availability of the data during transmat.
Checksums
Checksums assist with the detection of alterations of data during transmat. Checksums assist with the integrity, but not confidentiality and availability of data during transmat.
Hashing
Hashing assists with the confidentiality, integrity but not availability of the data
Security Risks
Tampering
DDoS
SQL Injection
Data Interface
API
Data Structure
Format
Output Requirements
Input Requirements
Australian Privacy Standards
An organisations accountability
Integrity of personal information
The collection, use and disclosure of personal information
Individuals accessing their information