Security I
A. show understanding of the need to keep data safe from accidental damage, including corruption and human errors
B. show understanding of the need to keep data safe from malicious actions, including unauthorised viewing, deleting, copying and corruption
C. show understanding of how data are kept safe when stored and transmitted, including:
i. use of passwords, both entered at a keyboard and biometric
ii. use of firewalls, both software and hardware, including proxy servers
iii. use of Secure Socket Layer (SSL)
iv. use of symmetric encryption (plain text, cypher text and use of a key) showing understanding that increasing the length of a key increases the strength of the encryption
D. show understanding that increasing the length of a binary key increases the strength of the encryption