Google Links
Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge
Elements and Performance Criteria
Performance Evidence
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
explain certificate related infrastructure (certificate authorities, registration authorities, repository services)summarise common asymmetric key algorithms and their usageexplain common symmetric key algorithms and their usage, such as:advanced encryption standard (AES)data encryption standard (DES)triple data encryption algorithm (triple DES)Blowfishexplain encryption strengthsummarise various encryption types, including public key, secret key, hash keysummarise the functions and features of:access control permissionsdigital signaturessymmetric encryption, asymmetric encryption and one-way encryptiontimestampsexplain one-way message digests, such as message digest algorithm 5 (MD5) and secure hash algorithm (SHA)explain public key infrastructure (PKI), pretty good privacy (PGP) and GNU Privacy Guard (GnuPG)outline replay securityoutline possible sources of security threats, including eavesdropping, data interception, data corruption, data falsification and authentication issuesexplain transmission control protocol or internet protocol (TCP/IP) protocols and applicationssummarise security problems and challenges that arise from organisational issuesoutline wired equivalent privacy (WEP), Wi-Fi protected access (WPA) and Wi-Fi protected access 2 (WPA2).