ICT encryption

Description

The conversion of electronic data into a format which is readable only by authorized parties which use key encryption techniques, such as Public Key Infrastructure (PKI) and Secure Socket Layer (SSL).

Alternative labels

symmetric-key algorithm
asymmetric cryptography
public-key cryptography
SSL
secure sockets layer
transport layer security
TLS

Skill type

knowledge

Skill reusability level

sector-specific

Relationships with occupations

Essential knowledge

ICT encryption is an essential knowledge of the following occupations:

Optional knowledge

ICT encryption is optional for these occupations. This means knowing this knowledge may be an asset for career advancement if you are in one of these occupations.

ICT security administrator: ICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption.
Digital forensics expert: Digital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted or damaged, in a forensic manner with the aim to identify, preserve, recover, analyse and present facts and opinions about the digital information.
ICT security consultant: ICT security consultants advise and implement solutions to control access to data and programs. They promote a safe exchange of information.

Chief ICT security officer: Chief ICT security officers protect company and employee information against unauthorized access. They also define the Information System security policy, manage security deployment across all Information Systems and ensure the provision of information availability.
ICT technician: ICT technicians install, maintain, repair and operate information systems and any ICT related equipment (laptops, desktops, servers, tablets, smart phones, communications equipment, printers and any piece of computer related peripheral networks), and any type of software (drivers, operating systems, applications).
Ethical hacker: Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational weaknesses.
ICT security manager: ICT security managers propose and implement necessary security updates. They advise, support, inform and provide training and security awareness and take direct action on all or part of a network or system.

ICT security technician: ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awareness.

 


 

References

  1. ICT encryption – ESCO

 

Last updated on September 20, 2022

Thinking about your next career move?

Answer a few questions about your jobs and education, and we’ll give you suggestions about your best possible career move. It’s completely free!