E N D
Encryption and Hacking Jan 11
Your Answer • An encryption key is used to keep data safe from unauthorised users by scrambling data to make its contents unreadable by people without the right authorisation. It does this by having one key for encrypting the data and one key for decrypting the data.
Your Answer encrypted unreadable decryption Passwords guess secret Firewalls recognised
User IDs and passwords June 11 Q5
Your Answer • So that the software can identify which account you are attempting to log on to. • So that the software knows that you are authorised to access the account.
Your Answer • ` • ` • `
Your Answer • Malicious software is the term to describe a piece of software that either allows an unauthorised user to enter a secure system without the owner’s or user’s consent and does them or their computer system harm. Examples of malicious software include viruses, worms and spyware. • (i) Encrypt data so that even if is stolen, by spyware for example, the thief is unable to read the data. (ii) Do not open any suspicious files or emails without verifying where they have come from. Signs of suspicious emails is when they do not have a subject or are from a strange name or company.
Your Answer • Don’t give out any personal information even if you know the person. Don’t know who could be seeing the information • Never tell confidential information such as passwords • Do not arrange to meet someone except in school • Avoid people with suspicious names