Skip to main content

Topic 1: Digital methods for exchanging data

  • Recognise and describe
    - encryption and authentication strategies appropriate for securing data transmissions and their differences, e.g. two-factor or multi-factor authentication (2FA/MFA) using verification codes vs. biometrics
    - features of symmetric (Data Encryption Standard — DES, Triple DES, AES — Advanced Encryption Standard, Blowfish and Twofish) and asymmetric (RSA) encryption algorithms
    - how data compression, encryption and hashing are used in the storage and transfer of data
    - how simple algorithms consist of input, process and output at various stages
    - basic concepts and definitions of emerging technologies, e.g. machine learning, deep learning, neural networks, natural language processing
    - how particular algorithms process data differently, e.g. machine learning, deep learning, natural language processing and reinforcement learning algorithms
    - how useability principles are used to inform solution development
    - how the elements and principles of visual communication inform user interface development.
  • Explain
    - Australian Privacy Principles (2014) and ethics applicable to the use of personally identifiable or sensitive data from a digital systems perspective
    - network performance metrics of latency, jitter, and the guarantee and timeliness of delivery
    - network transmission principles, including, protocol standards e.g. TCP/IP, HTTP, FTP and VPN, packet switching, error detection and correction, routing and forwarding, flow and congestion control, quality of service (QoS), security e.g. confidentiality, integrity and availability of data
    - methods for data exchange used to transfer data across networked systems, including REST, JSON and XML, with the assistance of APIs that facilitate data exchange between different systems and applications.
  • Analyse and evaluate Caesar, Polyalphabetic (e.g. Vigenere and Gronsfeld), and one-time pad encryption algorithms.
  • Describe data using appropriate naming conventions, data formats and structures.
  • Symbolise and explain
    - how application sub-systems, e.g. front end, back end, work together to constitute a solution
    - secure data transmission techniques and processes, including the use of encryption, decryption, authentication, hashing and checksums.
  • Symbolise
    - representations of a digital solution
    - data flow through a system using data flow diagrams.
  • Develop algorithms with pseudocode using the basic constructs including assignment, sequence, selection, condition, iteration and modularisation.