0% found this document useful (0 votes)
0 views4 pages

Encryption Research Task 24S1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 4

NAME: YOUR NAME 10% KU

Encryption and Authentication Task [46 marks]

Due date: Week 6 Lesson 1

1. Using the websites below or others – find answers to the following questions.
Write your answers. They must be in your own words.

2. AS YOU GO Fill in the reference (URL or web address) row of the table to show where you
got your information from. Make sure you create both text and web address in the link.

Part A Thinking about encryption: (10 Marks) Possible Your


Research Questions mark mark

1 What is encryption? 1

Encryption is a way of scrambling data so that only authorized


parties can understand the information. In technical terms, it is the
process of converting human-readable plaintext to
incomprehensible text, also known as ciphertext. In simpler terms,
encryption takes readable data and alters it so that it appears
random. Encryption requires the use of a cryptographic key: a set of
mathematical values that both the sender and the recipient of an
encrypted message agree on.

Referenc https://www.cloudflare.com/en-gb/learning/ssl/what-is-
e encryption/

2 Why is encryption important? 1

Encryption is used to protect data from being stolen, changed, or


compromised and works by scrambling data into a secret code that
can only be unlocked with a unique digital key.

Referenc https://cloud.google.com/learn/what-is-encryption
e

3 How does encryption work? 1

How encryption works. Encryption works by encoding “plaintext”


into “ciphertext,” typically through the use of cryptographic
mathematical models known as algorithms. To decode the data
back to plaintext requires the use of a decryption key, a string of
numbers or a password also created by an algorithm.

Y9 Digital Technology 1
NAME: YOUR NAME 10% KU

Referenc https://cloud.google.com/learn/what-is-encryption
e

4 What is a "key" in encryption? 1

Referenc
e

5 Give an example of where encryption is used in everyday life? 2

6 What is end-to-end encryption, and why is it important for


4
messaging apps?

Referenc
e

7 What is the difference between symmetric and asymmetric


4
encryption?

Referenc
e

Part A Marks: 14

Par Thinking about authentication: (10 Marks) Y


tB Po o
Research Questions
ssi u
ble r
ma m
rk ar
k

1 What is authentication? 3

Ref
ere
nce

Y9 Digital Technology 2
NAME: YOUR NAME 10% KU

2 What is a username and password used for in authentication? 3

Ref
ere
nce

3 What makes a strong password? Give an example of a weak password and a strong
4
password.

Ref
ere
nce

4 What is two-factor authentication (2FA)? 3

Two-factor authentication (2FA) is an identity and access management security


method that requires two forms of identification to access resources and data. 2FA
gives businesses the ability to monitor and help safeguard their most vulnerable
information and networks.

Ref https://www.microsoft.com/en-au/security/business/security-101/what-is-two-
ere factor-authentication-2fa#:~:text=Two%2Dfactor%20authentication%20(2FA),most
nce %20vulnerable%20information%20and%20networks.

5 How does a fingerprint or face scan work for authentication? 3

Fingerprint scanners can capture a high-resolution image, most commonly your


thumbprint, that is hard to fake. Facial recognition uses a camera to scan your face
and compare it with an image to verify identity.

Ref https://www.illion.com.au/what-is-biometric-authentication/#:~:text=Fingerprint
ere %20scanners%20can%20capture%20a,that%20is%20hard%20to
nce %20fake.&text=Facial%20recognition%20uses%20a%20camera,an%20image%20to
%20verify%20identity.

6 What is a security question, and why is it used in authentication? 3

In Security Questions authentication method, an administrator can set up a series of


predefined questions. A user must answer these questions to get authenticated.
Security Questions are used when users forget their passwords. Security questions
are often easy to guess and can often bypass passwords.

Ref https://www.netiq.com/documentation/advanced-authentication-64/tenant-
ere administrator-guide/data/scrty_questns.html
nce

Y9 Digital Technology 3
NAME: YOUR NAME 10% KU

7 What is the purpose of a CAPTCHA in authentication? 3

What is a CAPTCHA? A CAPTCHA test is designed to determine if an online user is


really a human and not a bot. CAPTCHA is an acronym that stands for "Completely
Automated Public Turing test to tell Computers and Humans Apart." Users often
encounter CAPTCHA and reCAPTCHA tests on the Internet.

Ref https://www.cloudflare.com/en-gb/learning/bots/how-captchas-work/
ere
nce

8 Why is it important to have strong authentication methods for online accounts? 3

Strong authentication techniques put security first. Rather than making it easy for
anyone to move through your systems and tap into resources, you add a few extra
hoops to ensure that your users are who they say they are and access only what you
have deemed appropriate

Ref https://www.okta.com/au/identity-101/what-is-strong-authentication/
ere #:~:text=Strong%20authentication%20techniques%20put%20security,what%20you
nce %20have%20deemed%20appropriate.

Part B Marks: 25

References: 7

Grand Total Marks


46
Weighting (10%)

Upload your completed report to SEQTA.

Useful websites:

https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences

https://www.howtogeek.com/howto/33949/htg-explains-what-is-encryption-and-how-does-it-
work/

Y9 Digital Technology 4

You might also like