digisol cramming

Descripción

This is made the night before my mock exam so please no judgement
Ciara GLYNN
Fichas por Ciara GLYNN, actualizado hace 9 meses
Ciara GLYNN
Creado por Ciara GLYNN hace 10 meses
8
0

Resumen del Recurso

Pregunta Respuesta
COMPARISON JSON vs XML JSON – human–readable – key/values separated by : – more efficient – can use arrays XML – human–readable – end tags, therefore bulky – much more difficult to parse
DEFINITION XML eXtensible Markup Language – designed to store & transport data – markup language like HTML – "self–describing"
DEFINITION JSON JavaScript Object Notation – lightweight format for storing & transporting data – "self–describing", easy to understand; human–readable
DEFINITION API Application Programming Interface – provides programming language-specific functions to interact with hard/software, or data created by someone else
RULE/ETC CARP Contrast, Alignment, Repetition, Proximity
RULE/ETC Usability Principles (acronym) U SEAL! (Utility, Safety, Effectiveness, Accessibility and Learnability)
DEFINITION REST REpresentational State Transfer – an architectural style for data exchange, providing standards between computer systems on the web, making it easier for systems to communicate – stateless, so the server doesn't need to know anything about what state client is in and vice versa – data is cached
COMPARISON Synchronous vs Asynchronous communication Synchronous: – sender and receiver of data are synchronised, and timing is organised – happens in real time Asynchronous: – parties don't actively listen for messages – doesn't happen in real time
DEFINITION HTTP/HTTPS HyperText Transfer Protocol/Secure – stateless request/response protocol – HTTPS is more secure version, as it uses TLS or SSL to encrypt transmission
RULE/ETC The 'CIA Triad' 3 main security risks for data exchange: – Confidentiality (some non–intended recipient might see data) – Integrity (someone could intercept and modify data message) – Availability (someone could interfere with data)
DEFINITION Encryption the process of converting data into a secure and unreadable format using cryptography (helps with confidentiality and integrity)
DEFINITION Authentication the process of verifying the identity of a user, system, or entity to grant or deny access to data (helps with confidentiality and integrity)
DEFINITION Checksums – value derived from data to verify its integrity and detect errors/corruption during process – generated using algorithms like CRC or MD5 – often applied to files, network packets, and data blocks
DEFINITION Hashing – process that converts input data of any size into a fixed–size string of characters using a hash function – detects unauthorised changes during data exchange – one–way: can't go back to figure out message
DEFINITION Digital Signature – cryptographic mechanism created by signer's key, and verified with the signer's public key - authenticates electronic documents and transactions
DIAGRAM OSI Model
DEFINITION Jitter - aka packet delay variance - is the irregular latency in data exchanges caused by electronic noise or clock timing errors
DEFINITION Latency - delay between when an application requests and receives data - influenced by: Serialisation, Propagation, Switching and Queuing
DEFINITION FTP File Transfer Protocol a network protocol for transmitting files between computers over the internet
DEFINITION AJAX - Allows web pages to be updated asynchronously, by exchanging data with a web server behind the scenes - can update part of a page without having to reload
PROCESS Caesar Cipher To encrypt: for each letter in plaintext, shift the letter forward by same key shift; this is then ciphertext To decrypt: for each letter in ciphertext, shift the letter backward by the same key shift; this gives you plaintext
PROCESS Polyalphabetic Cipher 1. Pick keyWORD, the longer the better 2. Convert each letter to number of their position in alphabet 3. Each letter of plaintext is shifted by corresponding letter (using mod in case it goes over 26) in repeating keyword
PROCESS One–time Pad Cipher - a randomly generated list of letters the same length as the message is generated - works like polyalphabetic, but no repeating pattern, so much harder to crack
LIST Common encryption algos and differentiations TripleDES (3DES) - symmetric, applies DES 3 times Blowfish, Twofish - symmetric block cipher, simple PGP - symmetric + public key, open-source RSA - asymmetric, uses public/private key pairs
COMPARISON Symmetric vs Asymmetric Encryption Symmetric: uses a single key for both en/decryption of data, which is shared between sender & recipient Asymmetric: uses public key for anyone to encrypt, secret private key to decrypt (helps confidentiality, authentication)
DEFINITION VPN Virtual Private Network an encrypted connection (like a tunnel) over the internet from a device to a network
LIST Most important APPs (privacy principles) Australian Privacy Principle 1 - open and transparent management of personal information Australian Privacy Principle 6 - use or disclosure of personal information Australian Privacy Principle 11 - security of personal information
LIST Internet Protocols HTTP HTTPS FTP VPN (they all have a p)
LIST Common Hashing algos MD5 - widely used, 128-bit SHA - family of cryptographic hash functions, inc. SHA-1, SHA-256, SHA-512
PROCESS Normalisation 1NF - Each record within a table is atomic in nature, separate records are different 2NF - Each attribute is fully dependant on the primary key(s) within the record 3NF - Each record within a table must not have any other data dependencies other than the primary keys
DEFINITION Australian Privacy Principle 1 open and transparent management of personal information
DEFINITION Australian Privacy Principle 6 Use or disclosure of personal information
DEFINITION Australian Privacy Principle 11 Security of personal information
Mostrar resumen completo Ocultar resumen completo

Similar

Intoxication
Yasmine King
Break-even Analysis - FLASH CARDS
Harshad Karia
Biology Unit 4: Respiration and Photosynthesis
Charlotte Lloyd
GCSE AQA Biology - Unit 3
James Jolliffe
B3, C3, P3
George Moores
Psychology | Unit 4 | Addiction - Explanations
showmestarlight
exothermic and endothermic reactions
janey.efen
OCR Gateway Biology Flash Cards
Sam Newey
Unit 3.1: Marketing
nk_
Believing in God Flashcards - Edexcel GCSE Religious Studies Unit 3
georgialennon
AQA GCSE Chemistry Unit 3 quiz
Gabi Germain