Managing Data

Data Security Methods

Contributors
Christian Bien Portrait_edited.jpg

Christian Bien

tutorial.png
Asymmetric Encryption - Simply Explained

This video goes through how public-key cryptography works, private and public keys and other forms of encryption.

one.png
What are the Data Security Methods?
Slide1.jpeg

Under the syllabus, the following data security methods are under focus:

  • Passwords

  • Firewalls

  • Biometrics

  • Anti‐virus software

  • Digital signatures and digital certificates

  • Encryption


Passwords

A combination of characters, linked to an username (often an email), used to unlock access to certain computer resources. 


Google says a strong password contains the following:

  • Unique passwords

  • Long in length (at least 12 characters) and memorable

  • Avoids personal info or words

See more about creating a great password here (Google). 

Firewall

A hardware, software or router, that checks the incoming and outgoing data packets of a network and rejects any unauthorised data packets entering or leaving the network.

Biometrics

Unique human characteristics, used to verify the user to unlock access to certain computer resources. Biometrics can include:

  • Fingerprints

  • Eye ball

  • Voice

  • Facial recognition

Anti-Virus Software

Software installed on a device with the purpose of monitoring and removing malware. Malware is checked against a list of regularly updated virus definitions.

Digital Signatures

An electronic code, embedded in a document via public key infrastructure, with the purpose of verifying the contents of the document and the sender's identity.

Digital Certificates

An electronic passport, that uses public key infrastructure, to secure transmit data between a website and a user's device.

Encryption

Encryption is the process of encoding data, through algorithms, so it can only be read by the sender and its intended recipient. Encryption uses public key infrastructure, which consists of two keys, a public key that anyone can obtain off the web, and a private key known only by the sender and the intended recipient.

two.png
Slide2.jpeg
Topic Menu
Online Data Storage Methods
Security Techniques for Managing Data
Types of Backup Techniques
Purpose of Data Mining
Data Security Methods
User Generated Content
Hypertext Markup Language (HTML)

Want your ATAR notes to empower over 77,000 students per year?

Logo-New-Large.png

Join the Team.
Empower Education.

three.png

Sign Up for Free to Read More 

Get instant access to all content and subscribe to our weekly email list on study tips, opportunities and other free resources. 

It only takes a minute...

Slide3.jpeg
four.png
Slide4.jpeg
five.png
Slide5.jpeg
six.png
Slide6.jpeg
157-seven.png
Slide1.jpeg
156-eight.png
Slide8.jpeg