pdf, 4.32 MB
pdf, 4.32 MB

Show understanding of how data are kept safe when stored and transmitted, including:
use of passwords, both entered at a keyboard and biometric
use of firewalls, both software and hardware, including proxy servers
use of security protocols such as Secure Socket Layer (SSL) and Transport Layer Security (TLS)
use of symmetric encryption (plain text, cypher text and use of a key) showing understanding that
increasing the length of a key increases the strength of the encryption
Show understanding of the need to keep online systems safe from attacks including denial of service attacks, phishing, pharming.
Describe how security can be applied to real-life scenarios including, for example, online banking, shopping or safeguards when carrying out online transactions .

Creative Commons "Sharealike"

Reviews

Something went wrong, please try again later.

This resource hasn't been reviewed yet

To ensure quality for our reviews, only customers who have downloaded this resource can review it

Report this resourceto let us know if it violates our terms and conditions.
Our customer service team will review your report and will be in touch.