1 / 11

Jan 11

Encryption and Hacking. Jan 11. Your Answer.

minnie
Download Presentation

Jan 11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Encryption and Hacking Jan 11

  2. Your Answer • Endpoint Encryption for PC (EEPC) is a computer security system that prevents data stored on a hard drive from being read or used by an unauthorized person. With EEPC, users are forced to identify themselves to the security system when the computer is started. This is done by requiring up to three authentication methods:Password • User ID • Token (Loaded on a floppy disk or any ISO 7816 smart card) • If the person accessing the computer fails to enter the correct information, EEPC prevents access to the computer as well as the encrypted data stored within. To gain access to an EEPC protected PC when using a smart card, users must insert their card into the reader when the EEPC authentication screen is displayed, then type their password and optional user ID. After the smart card verifies the password and EEPC has established that the correct token is used, the user is then granted access to the computer.

  3. Your Answer encrypted unreadable decryption Passwords guess secret firewalls recognised

  4. User IDs and passwords June 11 Q5

  5. Your Answer • A) a username is used so that there is less chance of people having the same ID for a website • B) a password is used so that only the user with knowledge of the password may enter and access information

  6. Your Answer

  7. Malware

  8. Your Answer • A) Malicious software is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. • B) The school could use an antivirus software which would be able to identify malicious software. The school could also create lots of backups of the documents so that if a malware software got into the school they would still have all of the data.

  9. Data Security

  10. Your Answer • 1) don’t give out personal information • 2)don’t accept chat room invites from people you don’t know • 3)don’t download anything that is being offered to you by another account • 4)Get a decent anti virus in case the site tries to get you to install something that turns out to be bad

More Related