Applying cryptography in secure software design

This activity helps you apply your understanding of cryptography to system design, with an exam-style question to practise writing a structured response.

Structuring prompt

Before answering the question, brainstorm examples of where cryptographic techniques might support these security goals in a system:

Design goal

How cryptography supports it

Data protection

Regulatory compliance

Security by design

Privacy

Examples to consider:

  • Password hashing

  • HTTPS

  • Encrypted file storage

  • Digital signatures

  • API key validation


Extended response question (5 marks)

Question

Explain how cryptographic techniques support the design of secure software systems. In your response, refer to at least two of the following design goals: – data protection – security by design – privacy – regulatory compliance

Last updated

Was this helpful?