+ All Categories
Home > Documents > Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from...

Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from...

Date post: 04-Jan-2016
Category:
Upload: hugh-nicholson
View: 218 times
Download: 0 times
Share this document with a friend
Popular Tags:
11
Jan 11 Encryption and Hacking
Transcript
Page 1: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

Jan 11

Encryption and Hacking

Page 2: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

Your Answer

Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the text in files mixed up so users can’t read it unless they have an encryption key. An encryption key is used so that the person opening the file can read what it says. Only the people who are using the file know the encryption key.

Page 3: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

Your Answer

encrypted

unreadable

decryption

passwords

secret guess

Firewalls

recognised

Page 4: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

June 11 Q5

User IDs and passwords

Page 5: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

Your Answer

1. The purpose of a username is so that the database of users for a website can recognise who the user is.

2. The purpose of a password is so only the user who created the account can access it and stops unauthorised users from using the account

Page 6: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

Your Answer

Page 7: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

Malware

Page 8: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

Your Answer6(a) Malicious software, commonly known as malware, are files that go onto your computer without the knowledge of the user. An safe-ish example in adware, which is just popups that come onto the screen. Another example is spyware that can record keystrokes and send them back to the creator of the spyware. More examples are viruses, computer worms and Trojan horses.

6(b) 1.One way a school can prevent malicious software is to use anti-virus software to scan the system to see if there are any corrupt files that could contain malware and inform the user.

2. Another way is to use a firewall to stop unauthorised computers from connecting to the network. If unauthorised users connect to a network, they could download malware that could harm the network.

Page 9: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

Data Security

Page 10: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Page 11: Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.

Your Answer

1. Don’t say personal details eg.DOB, address2. Don’t post anything you wouldn’t want

anyone to see eg. Photos 3. Don’t arrange to meet up with any strangers4. Stay to age restrictions on chat rooms as

there might be inappropriate words being said.


Recommended