
Cybersecurity Principles
Students analyse common cybersecurity threats and the strategies used to protect data integrity and privacy. They explore encryption, authentication, and the legal obligations of data custodians in Australia.
About This Topic
Students analyse common cybersecurity threats and the strategies used to protect data integrity and privacy. They explore encryption, authentication, and the legal obligations of data custodians in Australia.
Key Questions
- What are the most common vulnerabilities in web applications?
- How does public-key cryptography work?
- What are the legal requirements for data protection in Australia?
More in Data-Driven Solutions and Security
Relational Database Modelling
Students design relational databases using entity-relationship diagrams and normalisation techniques. They construct complex SQL queries to manage and extract meaningful data.
2 methodologies
Data Exchange and APIs
This topic investigates how digital systems communicate and share data using APIs and standard formats like JSON and XML. Students implement data exchange protocols in their own applications.
2 methodologies