Encryption Research Task 24S1
Encryption Research Task 24S1
Encryption Research Task 24S1
1. Using the websites below or others – find answers to the following questions.
Write your answers. They must be in your own words.
2. AS YOU GO Fill in the reference (URL or web address) row of the table to show where you
got your information from. Make sure you create both text and web address in the link.
1 What is encryption? 1
Referenc https://www.cloudflare.com/en-gb/learning/ssl/what-is-
e encryption/
Referenc https://cloud.google.com/learn/what-is-encryption
e
Y9 Digital Technology 1
NAME: YOUR NAME 10% KU
Referenc https://cloud.google.com/learn/what-is-encryption
e
Referenc
e
Referenc
e
Referenc
e
Part A Marks: 14
1 What is authentication? 3
Ref
ere
nce
Y9 Digital Technology 2
NAME: YOUR NAME 10% KU
Ref
ere
nce
3 What makes a strong password? Give an example of a weak password and a strong
4
password.
Ref
ere
nce
Ref https://www.microsoft.com/en-au/security/business/security-101/what-is-two-
ere factor-authentication-2fa#:~:text=Two%2Dfactor%20authentication%20(2FA),most
nce %20vulnerable%20information%20and%20networks.
Ref https://www.illion.com.au/what-is-biometric-authentication/#:~:text=Fingerprint
ere %20scanners%20can%20capture%20a,that%20is%20hard%20to
nce %20fake.&text=Facial%20recognition%20uses%20a%20camera,an%20image%20to
%20verify%20identity.
Ref https://www.netiq.com/documentation/advanced-authentication-64/tenant-
ere administrator-guide/data/scrty_questns.html
nce
Y9 Digital Technology 3
NAME: YOUR NAME 10% KU
Ref https://www.cloudflare.com/en-gb/learning/bots/how-captchas-work/
ere
nce
Strong authentication techniques put security first. Rather than making it easy for
anyone to move through your systems and tap into resources, you add a few extra
hoops to ensure that your users are who they say they are and access only what you
have deemed appropriate
Ref https://www.okta.com/au/identity-101/what-is-strong-authentication/
ere #:~:text=Strong%20authentication%20techniques%20put%20security,what%20you
nce %20have%20deemed%20appropriate.
Part B Marks: 25
References: 7
Useful websites:
https://www.ssl2buy.com/wiki/symmetric-vs-asymmetric-encryption-what-are-differences
https://www.howtogeek.com/howto/33949/htg-explains-what-is-encryption-and-how-does-it-
work/
Y9 Digital Technology 4