1 / 12

Exam Questions – Davina Shah

Exam Questions – Davina Shah. Encryption and Hacking. Jan 11. Your Answer. When the data is encrypted, all the information is scrabbled up so that if the data is stolen it can not be understood by anyone. This means that data is safe as unauthorised users will not be able to read the data. .

niyati
Download Presentation

Exam Questions – Davina Shah

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Exam Questions – Davina Shah

  2. Encryption and Hacking Jan 11

  3. Your Answer • When the data is encrypted, all the information is scrabbled up so that if the data is stolen it can not be understood by anyone. This means that data is safe as unauthorised users will not be able to read the data.

  4. Your Answer encrypted unreadable decryption Passwords guess secret Firewalls recognised

  5. User IDs and passwords June 11 Q5

  6. Your Answer • A username is needed so that others do not have the same ID and you can tell people apart. • The purpose of a password is that others cannot access data or files that are private and a password protects your account from everyone else.

  7. Your Answer

  8. Malware

  9. Your Answer • Malicious software is the term used to describe any computer program that enters a computer system without the owner or user’s consent and does them or their computer system harm, examples would include: viruses, worms – copy themselves and use networks to spread around without any user to perform tasks, spyware – collects information about users without their knowledge or consent, adware – software is automatically downloaded and installed on a computer system and Trojan horse – a software application that seems to the user to perform a useful task or job. • Schools can make sure that students do not look at websites that show inappropriate materials as these often carry viruses and malicious software. • Schools can also make sure that students do not download software, e.g. files or programs, from websites that are not genuine, e.g. make sure students do not download illegal music, video files or other software.

  10. Data Security

  11. Your Answer She should: • Do not give out any personal information, e.g. your address and phone numbers. • Make sure that nobody has access to her password to enter the chat room, and make sure that she does not share her password with others. • She shouldn’t open any files that are attached in the chat room as they may contain a virus, and she shouldn’t open any hyperlinks that are sent in case they also contain viruses. • Make sure that the person she is talking to is actually a student and has not stolen a students identity.

More Related