Unit 4 Digital Impacts - Topic 1: Digital methods for exchanging data
In this topic, students will:
- recognise and describe
- encryption and authentication strategies appropriate for securing data transmissions and their differences
- features of symmetric (Data Encryption Standard — DES, Triple DES, AES — Advanced Encryption Standard, Blowfish and Twofish) and asymmetric (RSA) encryption algorithms
- how data compression, encryption and hashing are used in the storage and transfer of data
- how simple algorithms consist of input, process and output at various stages
- how useability principles are used to inform solution development
- how the elements and principles of visual communication inform user interface development
- explain
- Australian Privacy Principles (2014 - OAIC) and ethics applicable to the use of personally identifiable or sensitive data from a digital systems perspective
- network transmission principles, including latency, jitter, guarantee and timeliness of delivery, and protocols relevant to the transmission of data over the internet, e.g. HTTP, HTTPS, FTP, VPN, streaming and broadcasting data packets
- methods for data exchange used to transfer data across networked systems including REST, JSON and XML
- symbolise, analyse and evaluate Caesar, Polyalphabetic (e.g. Vigenere and Gronsfeld), and one-time pad encryption algorithms
- describe data using appropriate naming conventions, data formats and structures
- symbolise and explain
- how application sub-systems, e.g. front end, back end, work together to constitute a solution
- secure data transmission techniques and processes, including the use of encryption, decryption, authentication, hashing and checksums
- the basic constructs of an algorithm, including assignment, sequence, selection, condition, iteration and modularisation
- symbolise
- representations of a digital solution
- data flow through a system using data flow diagrams.