Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Determine encryption methods
  2. Implement encryption
  3. Monitor encryption

Knowledge Evidence

To complete the unit requirements safely and effectively, the individual must:

explain certificate related infrastructure (certificate authorities, registration authorities, repository services)

summarise common asymmetric key algorithms and their usage

explain common symmetric key algorithms and their usage, such as:

advanced encryption standard (AES)

data encryption standard (DES)

triple data encryption algorithm (triple DES)

Blowfish

explain encryption strength

summarise various encryption types, including public key, secret key, hash key

summarise the functions and features of:

access control permissions

digital signatures

symmetric encryption, asymmetric encryption and one-way encryption

timestamps

explain one-way message digests, such as message digest algorithm 5 (MD5) and secure hash algorithm (SHA)

explain public key infrastructure (PKI), pretty good privacy (PGP) and GNU Privacy Guard (GnuPG)

outline replay security

outline possible sources of security threats, including eavesdropping, data interception, data corruption, data falsification and authentication issues

explain transmission control protocol or internet protocol (TCP/IP) protocols and applications

summarise security problems and challenges that arise from organisational issues

outline wired equivalent privacy (WEP), Wi-Fi protected access (WPA) and Wi-Fi protected access 2 (WPA2).