Students should explore how data can be secured through various methods such as access controls, virus checking, encryption, backups, data masking, and data erasure. Examine malicious code such as computer viruses, malware, adware, Trojans and spyware that are used to commit cyber-attacks. As an extension, set up the challenge of designing a secure digital system.
Flow of Activities
Students should develop an understanding of how digital systems can be restricted to authorised use. Authorisation is a key aspect of information security.
Security is a key concern on the internet, especially when sending and receiving sensitive information. A common way of providing information security over the internet is through encryption. Information is encoded and with the relevant 'key' the computer decodes the message.
Historical examples are often given to help explain encryption. One such example is the Enigma code, a type of enciphering used by the German armed forces. Alan Turing famously cracked the code.
Cybercriminals use malicious code such as computer viruses, malware, adware, Trojans and spyware to commit cyber-attacks.
Hackers, those that are involved in cybercrime, generally learn how computer systems and networks operate and then use this knowledge to gain unauthorised access to computer systems.