Data encryption and transmission v2.0
Learn how data is protected using encryption techniques.
![data encryption and transmission graphic](/sites/default/files/styles/content_x1/public/2023-05/data%20encryption-secondary.png?itok=1Z2zjc27)
More resources:
- Access Data Encryption and Transmission v2.0
- Explore more junior secondary lessons and resources Grok Academy
- Explore senior secondary lessons and resources Grok Academy
- Access Cyberhunt - a collection of short 5-15 min conversation starters, warm-up activities, or challenges
- Get a collection of cyber security posters
Learn the many different ways data can be hidden inside other data, including through classical substitution ciphers. This activity involves no programming and is a great starting point for understanding the fundamental principles of cryptographic techniques.
Year groups: Foundation 7 – 9
Access Data Encryption and Transmission v2.0
Date: On-demand
Syllabus outcomes
NESA outcomes
Information and Software Technology 7 – 10: 5.2.1, 5.2.2, 5.3.3
Australian Curriculum version 8.4
ACTDIK023, ACTDIK024, ACTDIP029, ACTDIP030