By the end of this sub-unit, you should be able to

  • show understanding of the need to keep data safe from accidental damage, including corruption and human errors
  • show understanding of the need to keep data safe from malicious actions, including unauthorised viewing, deleting, copying and corruption

By the end of this sub-unit, you should be able to

  • show understanding of how data are kept safe when stored and transmitted, including:
    • use of passwords, both entered at a keyboard and biometric
    • use of firewalls, both software and hardware, including proxy servers
    • use of Secure Socket Layer (SSL)
    • use of symmetric encryption (plain text, cypher text and use of a key) showing understanding that increasing the length of a key increases the strength of the encryption

By the end of this sub-unit, you should be able to

  • show understanding of the need to keep online systems safe from attacks including:
    • denial of service attacks;
    • phishing;
    • pharming

By the end of this sub-unit, you should be able to

  • describe how the knowledge from 1.4.1, 1.4.2 and 1.4.3 can be applied to real-life scenarios including, for example:
    • online banking;
    • shopping