Security threats, including vandalism, sabotage, breach of privacy or confidentiality, theft and fraud, violations of data integrity, denial of service Organisational issues surrounding security Functions and features of stored value payment systems (e.g. DigiCash, CyberCoin, Mondex, CAFE, Visa Cash) Functions and features of common stored account payment systems (e.g. First Virtual's Internet Payment System, CyberCash secure internet payment system, Secure Electronic Transactions standard (SET), smart cards) Functions and features of generic secure protocols (e.g. secure socket layer (SSL), secure hypertext transfer protocol (SHTTP), secure multi-purpose internet mail extensions (S/MIME)) Functions and features of automated intrusion detection software, functions and features of network address translation (NAT) in relation to securing internal IP addresses, buffer overruns and stack smashing with reference to operating system deficiencies, functions and features of authentication and access control (e.g. single-factor and two-factor authentication, biometric authentication) Functions and features of cryptography, including digital signatures and public and private key algorithms, functions and features of CGI scripts, advantages and disadvantages of using the range of security features, protocol stack for internet communications, knowledge of physical web server security, particularly remote hosts Australian Computer Society Code of Ethics Copyright and intellectual property The Commonwealth Privacy Act 2000 |