
Data Security Methods
Applied IT (Year 12) - Managing Data
Christian Bien
Asymmetric Encryption - Simply Explained
This video goes through how public-key cryptography works, private and public keys and other forms of encryption.
What are the Data Security Methods?
Under the syllabus, the following data security methods are under focus:
Passwords
Firewalls
Biometrics
Anti-virus software
Digital signatures and digital certificates
Encryption
Passwords
A combination of characters, linked to a username (often an email), used to unlock access to certain computer resources.Â
Google says a strong password contains the following:
Unique passwords
Long in length (at least 12 characters) and memorable
Avoids personal info or words
See more about creating a great password here (Google). ​
Firewall
A hardware, software or router that checks the incoming and outgoing data packets of a network and rejects any unauthorised data packets entering or leaving the network.​
Biometrics
Unique human characteristics used to verify the user to unlock access to certain computer resources. Biometrics can include:
Fingerprints
Eyeball
Voice & Facial recognition​
Anti-Virus Software
Software installed on a device with the purpose of monitoring and removing malware. Malware is checked against a list of regularly updated virus definitions.​
Digital Signatures
An electronic code, embedded in a document via public key infrastructure, with the purpose of verifying the contents of the document and the sender's identity.​
Digital Certificates
An electronic passport, that uses public key infrastructure, to securely transmit data between a website and a user's device.​
Encryption
Encryption is the process of encoding data, through algorithms, so it can only be read by the sender and its intended recipient. Encryption uses public key infrastructure, which consists of two keys, a public key that anyone can obtain off the web, and a private key known only by the sender and the intended recipient.