week 20

K1.20 The purpose and types of encryption as a risk mitigation technique and their applications:

• purpose – to store and transfer data securely using cryptography

• types of encryption and their applications:

o asymmetric encryption – applied to send private data from one user to another (for example

encrypted email systems)

o symmetric encryption – applied to encrypt and decrypt a message using the same key (for

example card payment systems)

o data at rest encryption:

▪ full disk encryption – applied to encrypt the contents of an entire hard drive using industry

standard tool (for example Windows, macOS)

▪ hardware security module (HSM) – safeguards digital keys to protect a device and its data

from hacking

▪ trusted platform module (TPM) – applied to store encryption keys specific to the host device

o data in transit encryption:

▪ secure sockets layer (SSL) – applied to create an encrypted link between a website and a

browser using security keys for businesses to protect the data on their websites

▪ transport layer security (TLS) – applied to encrypt end-to-end communication between

networks (for example in email, websites and instant messaging)


Last Updated
2024-07-11 08:59:54

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage





Files that support this week


| | | | |
Week 19
Prev
Week 20
Prev
Week 21
Prev

Next

Next
Webmaster Spelling Notifications