Data encryption and transmission v2.0
Learn how data is protected using encryption techniques.
More resources:
- Access Cyberhunt - a collection of short 5-15 min conversation starters, warm-up activities, or challenges
- Get a collection of cyber security posters
Learn the many different ways data can be hidden inside other data, including through classical substitution ciphers. This activity involves no programming and is a great starting point for understanding the fundamental principles of cryptographic techniques.
Year groups: Foundation 7 – 9
Access Data Encryption and Transmission v2.0
Date: On-demand
Syllabus outcomes
NESA outcomes
Information and Software Technology 7 – 10: 5.2.1, 5.2.2, 5.3.3
Australian Curriculum version 8.4
ACTDIK023, ACTDIK024, ACTDIP029, ACTDIP030