AC9TDI10K01

See also: Learning Areas / Technologies / Digital Technologies / Knowledge and understanding / Digital systems / Years 9 and 10

investigate how hardware and software manage, control and secure access to data in networked digital systems

Elaborations
  • AC9TDI10K01_E1 - explaining how the operating system hides the complexity of different hardware from applications, for example applications can treat input from a mouse and touch screen in the same way
  • AC9TDI10K01_E2 - exploring how public key cryptography, for example TLS, and hashing, such as SHA-1, secure the storage and transmission of data
  • AC9TDI10K01_E3 - configuring a simple network using real or simulated hardware and observing packets moving around the network, for example monitoring packets on simulated switches and networked devices
  • AC9TDI10K01_E4 - explaining how domain names and IP addresses allow data to be transmitted to specific networked devices, for example DNS and routing tables
  • AC9TDI10K01_E5 - describing elements of access control and explaining why they are necessary, for example authentication and permissions for restricting access to install software to administrators
Achievement Standard Components
  • ASTECTDI91004 - Students explain how digital systems manage, control and secure access to data; and model cyber security threats and explore a vulnerability.