Download presentation
Presentation is loading. Please wait.
Published byClaire Dalton Modified over 8 years ago
1
SECURE NETWORKS Device detects all network within radius Secure networks require SSID Password ENCRYPTION Translated into code Uses a mathematical Key Receiver must have key to de-code Uses Prime Numbers COPYRIGHT Digital Rights Management Video Streaming, compression COMPUTER SECURITY Username Password Cookies Malware Ransomware Virus Spyware Cyber crimes FIREWALL Describe what a Firewall is
3
Bluejacking VoIP IMAPPOP Encryption
4
Place/situation where mobile phone use banned Reason for ban Consequence of being caught using mobile phone
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.