Recognise and describe - encryption and authentication strategies appropriate for securing data transmissions and their differences, e.g. two-factor or multi-factor authentication (2FA/MFA) using verification codes vs. biometrics - features of symmetric (Data Encryption Standard — DES, Triple DES, AES — Advanced Encryption Standard, Blowfish and Twofish) and asymmetric (RSA) encryption algorithms - how data compression, encryption and hashing are used in the storage and transfer of data - how simple algorithms consist of input, process and output at various stages - basic concepts and definitions of emerging technologies, e.g. machine learning, deep learning, neural networks, natural language processing - how particular algorithms process data differently, e.g. machine learning, deep learning, natural language processing and reinforcement learning algorithms - how useability principles are used to inform solution development - how the elements and principles of visual communication inform user interface development.
Explain - Australian Privacy Principles (2014) and ethics applicable to the use of personally identifiable or sensitive data from a digital systems perspective - network performance metrics of latency, jitter, and the guarantee and timeliness of delivery - network transmission principles, including, protocol standards e.g. TCP/IP, HTTP, FTP and VPN, packet switching, error detection and correction, routing and forwarding, flow and congestion control, quality of service (QoS), security e.g. confidentiality, integrity and availability of data - methods for data exchange used to transfer data across networked systems, including REST, JSON and XML, with the assistance of APIs that facilitate data exchange between different systems and applications.
Analyse and evaluate Caesar, Polyalphabetic (e.g. Vigenere and Gronsfeld), and one-time pad encryption algorithms.
Describe data using appropriate naming conventions, data formats and structures.
Symbolise and explain - how application sub-systems, e.g. front end, back end, work together to constitute a solution - secure data transmission techniques and processes, including the use of encryption, decryption, authentication, hashing and checksums.
Symbolise - representations of a digital solution - data flow through a system using data flow diagrams.
Develop algorithms with pseudocode using the basic constructs including assignment, sequence, selection, condition, iteration and modularisation.