jan 11
DESCRIPTION
Encryption and Hacking. Jan 11. Your Answer. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/1.jpg)
Jan 11
Encryption and Hacking
![Page 2: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/2.jpg)
Your Answer
• An encryption key is used to keep data safe from unauthorised users by scrambling data to make its contents unreadable by people without the right authorisation. It does this by having one key for encrypting the data and one key for decrypting the data.
![Page 3: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/3.jpg)
Your Answer
encrypted
unreadable
decryption
Passwords
secret guess
Firewalls
recognised
![Page 4: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/4.jpg)
June 11 Q5
User IDs and passwords
![Page 5: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/5.jpg)
Your Answer
a) So that the software can identify which account you are attempting to log on to.
b) So that the software knows that you are authorised to access the account.
![Page 6: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/6.jpg)
Your Answer
`
`
`
![Page 7: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/7.jpg)
Malware
![Page 8: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/8.jpg)
Your Answer
a) Malicious software is the term to describe a piece of software that either allows an unauthorised user to enter a secure system without the owner’s or user’s consent and does them or their computer system harm. Examples of malicious software include viruses, worms and spyware.
b) (i) Encrypt data so that even if is stolen, by spyware for example, the thief is unable to read the data.
(ii) Do not open any suspicious files or emails without verifying where they have come from. Signs of suspicious emails is when they do not have a subject or are from a strange name or company.
![Page 9: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/9.jpg)
Data Security
![Page 10: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/10.jpg)
![Page 11: Jan 11](https://reader035.vdocuments.us/reader035/viewer/2022070420/56815e47550346895dccbbb5/html5/thumbnails/11.jpg)
Your Answer
1) Don’t give out any personal information even if you know the person. Don’t know who could be seeing the information
2) Never tell confidential information such as passwords
3) Do not arrange to meet someone except in school
4) Avoid people with suspicious names