1 / 11

Jan 11

Encryption and Hacking. Jan 11. Your Answer. It changes the order of characters and information into a unreadable state with only the key able to decrypt it. Your Answer. Encrypted. Unreadable. Decryption. Passwords. Secret. Guess. Firewalls. Recognised. User IDs and passwords.

zwi
Download Presentation

Jan 11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Encryption and Hacking Jan 11

  2. Your Answer • It changes the order of characters and information into a unreadable state with only the key able to decrypt it

  3. Your Answer Encrypted Unreadable Decryption Passwords Secret Guess Firewalls Recognised

  4. User IDs and passwords June 11 Q5

  5. Your Answer • To differentiate between accounts • To protect documents and accounts

  6. Your Answer

  7. Malware

  8. Your Answer • Malicious software are programs that operate without your permission doing things that you did not ask it to do. For example a virus will enter you computer without your knowing and will edit and delete files that it attaches itself to. • Get anti-virus software • Put up a firewall to protect the network

  9. Data Security

  10. Your Answer • Keep account details secure • Make sure that only you and your friends can see the posts • Make sure that the website is safe before you sign up and give your details • Make sure you do not post anything that you will regret

More Related