K1.20 The purpose and types of encryption as a risk mitigation technique and their applications:
• purpose – to store and transfer data securely using cryptography
• types of encryption and their applications:
o asymmetric encryption – applied to send private data from one user to another (for example
encrypted email systems)
o symmetric encryption – applied to encrypt and decrypt a message using the same key (for
example card payment systems)
o data at rest encryption:
▪ full disk encryption – applied to encrypt the contents of an entire hard drive using industry
standard tool (for example Windows, macOS)
▪ hardware security module (HSM) – safeguards digital keys to protect a device and its data
from hacking
▪ trusted platform module (TPM) – applied to store encryption keys specific to the host device
o data in transit encryption:
▪ secure sockets layer (SSL) – applied to create an encrypted link between a website and a
browser using security keys for businesses to protect the data on their websites
▪ transport layer security (TLS) – applied to encrypt end-to-end communication between
networks (for example in email, websites and instant messaging)
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|