17 Security
17.1 Encryption, Encryption Protocols and Digital certificates
Show understanding of how encryption works Notes and guidance Including the use of public key, private key, plain text, cipher text, encryption, symmetric key
cryptography and asymmetric key cryptography
How the keys can be used to send a private message from the public to an individual/ organisation
How the keys can be used to send a verified message to the public
How data is encrypted and decrypted, using symmetric and asymmetric cryptography
Purpose, benefits and drawbacks of quantum cryptography
Show awareness of the Secure Socket Layer (SSL)/ Transport Layer Security (TLS) Purpose of SSL / TLS
Use of SSL/TLS in client-server communication
Situations where the use of SSL/TLS would be appropriate
Show understanding of digital certification How a digital certificate is acquired
How a digital certificate is used to produce digital signatures
Something went wrong, please try again later.
This resource hasn't been reviewed yet
To ensure quality for our reviews, only customers who have downloaded this resource can review it
Report this resourceto let us know if it violates our terms and conditions.
Our customer service team will review your report and will be in touch.