jan 11
Post on 14-Feb-2016
30 Views
Preview:
DESCRIPTION
TRANSCRIPT
Jan 11
Encryption and Hacking
Your Answer
• An encryption key is used to keep data safe from unauthorised users by scrambling data to make its contents unreadable by people without the right authorisation. It does this by having one key for encrypting the data and one key for decrypting the data.
Your Answer
encrypted
unreadable
decryption
Passwords
secret guess
Firewalls
recognised
June 11 Q5
User IDs and passwords
Your Answer
a) So that the software can identify which account you are attempting to log on to.
b) So that the software knows that you are authorised to access the account.
Your Answer
`
`
`
Malware
Your Answer
a) Malicious software is the term to describe a piece of software that either allows an unauthorised user to enter a secure system without the owner’s or user’s consent and does them or their computer system harm. Examples of malicious software include viruses, worms and spyware.
b) (i) Encrypt data so that even if is stolen, by spyware for example, the thief is unable to read the data.
(ii) Do not open any suspicious files or emails without verifying where they have come from. Signs of suspicious emails is when they do not have a subject or are from a strange name or company.
Data Security
Your Answer
1) Don’t give out any personal information even if you know the person. Don’t know who could be seeing the information
2) Never tell confidential information such as passwords
3) Do not arrange to meet someone except in school
4) Avoid people with suspicious names
top related