+ All Categories

Jan 11

Date post: 04-Feb-2016
Category:
Upload: minnie
View: 29 times
Download: 0 times
Share this document with a friend
Description:
Encryption and Hacking. Jan 11. Your Answer. - PowerPoint PPT Presentation
Popular Tags:
11
Jan 11 Encryption and Hacking
Transcript
Page 1: Jan 11

Jan 11

Encryption and Hacking

Page 2: Jan 11

Your Answer• Endpoint Encryption for PC (EEPC) is a computer security system that

prevents data stored on a hard drive from being read or used by an unauthorized person. With EEPC, users are forced to identify themselves to the security system when the computer is started. This is done by requiring up to three authentication methods:Password

• User ID• Token (Loaded on a floppy disk or any ISO 7816 smart card)• If the person accessing the computer fails to enter the correct information,

EEPC prevents access to the computer as well as the encrypted data stored within. To gain access to an EEPC protected PC when using a smart card, users must insert their card into the reader when the EEPC authentication screen is displayed, then type their password and optional user ID. After the smart card verifies the password and EEPC has established that the correct token is used, the user is then granted access to the computer.

Page 3: Jan 11

Your Answer

encrypted

unreadable

decryption

Passwords

secret guess

firewalls

recognised

Page 4: Jan 11

June 11 Q5

User IDs and passwords

Page 5: Jan 11

Your Answer

• A) a username is used so that there is less chance of people having the same ID for a website

• B) a password is used so that only the user with knowledge of the password may enter and access information

Page 6: Jan 11

Your Answer

Page 7: Jan 11

Malware

Page 8: Jan 11

Your Answer• A) Malicious software is software used or created by attackers to disrupt computer

operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.

• B) The school could use an antivirus software which would be able to identify malicious software. The school could also create lots of backups of the documents so that if a malware software got into the school they would still have all of the data.

Page 9: Jan 11

Data Security

Page 10: Jan 11
Page 11: Jan 11

Your Answer

• 1) don’t give out personal information• 2)don’t accept chat room invites from people

you don’t know• 3)don’t download anything that is being

offered to you by another account• 4)Get a decent anti virus in case the site tries

to get you to install something that turns out to be bad


Recommended