jan 11

11
Jan 11 Encryption and Hacking

Upload: joylyn

Post on 14-Feb-2016

30 views

Category:

Documents


2 download

DESCRIPTION

Encryption and Hacking. Jan 11. Your Answer. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Jan 11

Jan 11

Encryption and Hacking

Page 2: Jan 11

Your Answer

• An encryption key is used to keep data safe from unauthorised users by scrambling data to make its contents unreadable by people without the right authorisation. It does this by having one key for encrypting the data and one key for decrypting the data.

Page 3: Jan 11

Your Answer

encrypted

unreadable

decryption

Passwords

secret guess

Firewalls

recognised

Page 4: Jan 11

June 11 Q5

User IDs and passwords

Page 5: Jan 11

Your Answer

a) So that the software can identify which account you are attempting to log on to.

b) So that the software knows that you are authorised to access the account.

Page 6: Jan 11

Your Answer

`

`

`

Page 7: Jan 11

Malware

Page 8: Jan 11

Your Answer

a) Malicious software is the term to describe a piece of software that either allows an unauthorised user to enter a secure system without the owner’s or user’s consent and does them or their computer system harm. Examples of malicious software include viruses, worms and spyware.

b) (i) Encrypt data so that even if is stolen, by spyware for example, the thief is unable to read the data.

(ii) Do not open any suspicious files or emails without verifying where they have come from. Signs of suspicious emails is when they do not have a subject or are from a strange name or company.

Page 9: Jan 11

Data Security

Page 10: Jan 11
Page 11: Jan 11

Your Answer

1) Don’t give out any personal information even if you know the person. Don’t know who could be seeing the information

2) Never tell confidential information such as passwords

3) Do not arrange to meet someone except in school

4) Avoid people with suspicious names