Chapter 1
Chapter 1
Symmetric encryption
Symmetric encryption is the oldest method of
encryption. It requires both the sender and recipient to
possess a secret encryption and a decryption key
known as a private key. With this encryption you need
to send the private key over the internet and this can
be a threat as you can be intercepted while
transmitting the key from one place to another.
Asymmetric encryption
Type Check
A type check ensures data is of a defined data type,
such as integer, text, numerical, or date. Valid data
is valid, but not necessarily correct. For example, a
date of birth of 28/12/2087 is valid but incorrect.
Length Check
A length check ensures data is within a defined
length range, such as a password being at least six
characters long, a grade being exactly one character
long, or a product code being at least four
characters long. However, data of the allowed
length is not always correct, as it may not follow the
required format.
Format Check
A format check ensures data matches a defined
format. It is sometimes known as a picture check
and the data has to follow a pattern.
Verification
Visual Checking
Visual verification involves checking if the entered
data matches the original source by comparing it to
the displayed data. If the data matches, the process
passes, otherwise, it needs to be re-entered.
However, visual checking doesn't guarantee the data
entered is correct, as incorrect data can still pass the
verification process. For instance, if the intended
data is ABCD, it might be entered but not verified.
Parity Check
A parity check is a method used to identify errors in
data transmission, checking each byte individually. It
uses one bit in each byte as the parity bit, while the
remaining 7 bits represent the data. There are two
types of parity checks: even parity and odd parity.
Even parity ensures an even total number of on bits
in a byte, while odd parity sets the parity bit to on to
maintain even total on bits.
Checksum
Checksums are calculations on a file's contents used to
verify transmission or copying accuracy. They are
crucial in preventing hackers from misrepresenting
malicious files as genuine ones. The checksum is
typically represented as hexadecimal digits, with 2
hexadecimal digits representing a single byte. Popular
algorithms for generating checksums include SHA-256,
SHA-1, and MD5. However, MD5 and SHA-1 have been
known to generate collisions, where the same
checksum is generated for different files, potentially
allowing hackers to disguise malicious files. Despite
this, SH-1 and MD-5 are suitable for checking for
transmission errors. SHA-256 is currently the safest
checksum method.
Data Processing
Data processing is any activity that manipulates or
carries out operations on data.
Online processing
Online processing is defined differently by different
people. Specifically, interactive processing is the
subject of this course.
What you are most likely familiar with is interactive
processing. When a computer and user
communicate, it's said to be interactive. The
computer responds to data input by the user by
producing an output. Before data is saved to non-
volatile memory (such a disk) by the user, it is stored
in RAM while processing is happening. To enable the
user to see (or hear) the processing's outcomes, the
computer will process the data as soon as it can.
Response times will be in the thousandths for
routine operations like word processing,
spreadsheet analysis, web surfing, and email
checking.
Real-time processing
A real-time processing system processes data as
soon as it has been input. Such system are
normally used when the immediacy of the data is
vital.
Central heating system