Specification link
Asymmetric keys and encryption methods
- show understanding of the terms: public key, private key, plain text, cipher text, encryption and asymmetric key cryptography
- show understanding of how the keys can be used to send a private message from the public to an individual/organisation\
- show understanding of how the keys can be used to send a verified message to the public
Digital signatures and digital certificates
- show understanding of how a digital certificate is acquired
- show understanding of how a digital certificate is used to produce digital signatures
Encryption protocols
- show awareness of the purpose of Secure Socket Layer (SSL)/Transport Layer Security (TLS)
- show awareness of the use of SSL/TLS in client-server communication
- show awareness of situations where the use of SSL/TLS would be appropriate
Malware
- show understanding of malware: viruses, worms, spam, phishing, pharming
- describe vulnerabilities that the various types of malware can exploit
- describe methods that can be used to restrict the effect of malware
|