Managing Data

Data Security Methods​

Data Security Methods (WACE Syllabus)
  • passwords

  • firewalls

  • biometrics

  • anti‐virus software

  • digital signatures and digital certificates

  • encryption


A combination of characters, linked to an username (often an email), used to unlock access to certain computer resources.


A hardware, software or router, that checks the incoming and outgoing data packets of a network and rejects any unauthorised data packets entering or leaving the network. 


Unique human characteristics, used to verify the user to unlock access to certain computer resources. Biometrics can include:

  • Fingerprints

  • Eye ball

  • Voice

  • Facial recognition

Anti-Virus Software

Software installed on a device with the purpose of monitoring and removing malware. Malware is checked against a list of regularly updated virus definitions. 

Digital Signatures

An electronic code, embedded in a document via public key infrastructure, with the purpose of verifying the contents of the document and the sender's identity. 

Digital Certificates

An electronic passport, that uses public key infrastructure, to secure transmit data between a website and a user's device.


Encryption is the process of encoding data, through algorithms, so it can only be read by the sender and its intended recipient. Encryption uses public key infrastructure, which consists of two keys, a public key that anyone can obtain off the web, and a private key known only by the sender and the intended recipient. 


ABN: 87 574 760 103

  • Facebook - Black Circle
  • YouTube - Black Circle

"ATAR" is a registered trademark of Monash University as a Trustee For The Victorian Tertiary Admission Centre .The School Curriculum and Standards Authority (SCSA) have no involvement in or responsibility for any material appearing on this site. Nor does SCSA endorse or make any warranties regarding the study resources, current and past WACE exams available on this site or sold by Christian Bien. 

Copyright © 2020 Christian Bien at the ATAR Survival Guide