Download presentation
Presentation is loading. Please wait.
Published byHugh Nicholson Modified over 9 years ago
1
Jan 11 Encryption and Hacking
2
Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the text in files mixed up so users can’t read it unless they have an encryption key. An encryption key is used so that the person opening the file can read what it says. Only the people who are using the file know the encryption key.
3
Your Answer encrypted unreadable decryption passwords secret guess Firewalls recognised
4
June 11 Q5 User IDs and passwords
5
Your Answer 1.The purpose of a username is so that the database of users for a website can recognise who the user is. 2.The purpose of a password is so only the user who created the account can access it and stops unauthorised users from using the account
6
Your Answer
7
Malware
8
Your Answer 6(a) Malicious software, commonly known as malware, are files that go onto your computer without the knowledge of the user. An safe-ish example in adware, which is just popups that come onto the screen. Another example is spyware that can record keystrokes and send them back to the creator of the spyware. More examples are viruses, computer worms and Trojan horses. 6(b) 1.One way a school can prevent malicious software is to use anti-virus software to scan the system to see if there are any corrupt files that could contain malware and inform the user. 2. Another way is to use a firewall to stop unauthorised computers from connecting to the network. If unauthorised users connect to a network, they could download malware that could harm the network.
9
Data Security
11
Your Answer 1.Don’t say personal details eg.DOB, address 2.Don’t post anything you wouldn’t want anyone to see eg. Photos 3.Don’t arrange to meet up with any strangers 4.Stay to age restrictions on chat rooms as there might be inappropriate words being said.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.