AC9TDI10K01
Digital systems
investigate how hardware and software manage, control and secure access to data in networked digital systems
Elaborations
- AC9TDI10K01_E1explaining how the operating system hides the complexity of different hardware from applications, for example applications can treat input from a mouse and touch screen in the same way
- AC9TDI10K01_E2exploring how public key cryptography, for example TLS, and hashing, such as SHA-1, secure the storage and transmission of data
- AC9TDI10K01_E3configuring a simple network using real or simulated hardware and observing packets moving around the network, for example monitoring packets on simulated switches and networked devices
- AC9TDI10K01_E4explaining how domain names and IP addresses allow data to be transmitted to specific networked devices, for example DNS and routing tables
- AC9TDI10K01_E5describing elements of access control and explaining why they are necessary, for example authentication and permissions for restricting access to install software to administrators
Loading...