1 / 11

Jan 11

Encryption and Hacking. Jan 11. Your Answer.

joylyn
Télécharger la présentation

Jan 11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Encryption and Hacking Jan 11

  2. Your Answer • An encryption key is used to keep data safe from unauthorised users by scrambling data to make its contents unreadable by people without the right authorisation. It does this by having one key for encrypting the data and one key for decrypting the data.

  3. Your Answer encrypted unreadable decryption Passwords guess secret Firewalls recognised

  4. User IDs and passwords June 11 Q5

  5. Your Answer • So that the software can identify which account you are attempting to log on to. • So that the software knows that you are authorised to access the account.

  6. Your Answer • ` • ` • `

  7. Malware

  8. Your Answer • Malicious software is the term to describe a piece of software that either allows an unauthorised user to enter a secure system without the owner’s or user’s consent and does them or their computer system harm. Examples of malicious software include viruses, worms and spyware. • (i) Encrypt data so that even if is stolen, by spyware for example, the thief is unable to read the data. (ii) Do not open any suspicious files or emails without verifying where they have come from. Signs of suspicious emails is when they do not have a subject or are from a strange name or company.

  9. Data Security

  10. Your Answer • Don’t give out any personal information even if you know the person. Don’t know who could be seeing the information • Never tell confidential information such as passwords • Do not arrange to meet someone except in school • Avoid people with suspicious names

More Related