7
Jan 11 Encryption and Hacking tion turns normal text into nonsense, and changes it back with a key who is not authorised to view it, this is incomprehensible, but the le who are can change it back into normal text which they can unders

Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,

Embed Size (px)

Citation preview

Page 1: Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,

Jan 11

Encryption and Hacking

Encryption turns normal text into nonsense, and changes it back with a key. To

someone who is not authorised to view it, this is incomprehensible, but the person or

people who are can change it back into normal text which they can understand.

Page 2: Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,

Your Answer

encrypted

unreadable

Firewalls

Passwords

decryption

guess

recognised

secret

Page 3: Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,

June 11 Q5

User IDs and passwords

A username is used so that there cannot be more than one person with the

same identity.

A password is used so that unauthorised people cannot access your data.

Page 4: Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,

Your Answer

Page 5: Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,

Malware

Malicious software, otherwise known as malware, is computer programs that are unwelcome or unwanted, or simply just not known about. There are many different types of malware, such as viruses: software that gets into a computer by attaching themselves to files and applications, and can alter, damage or delete files; keyloggers, which track your keystrokes and can gather information such as passwords; and adware, which downloads itself onto your computer and advertises.Install anti-virus/anti-spyware software so that they can help prevent malware. You can get free ones.Block websites that may contain harmful content, such as music download sites.

Page 6: Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,

Data Security

Page 7: Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,

Never give out personal details such as address.

Use a username that cannot be used to identify her.

If she’s worried, tell someone straight away and save the chat if possible.

If making arrangements with someone, check face to face that it is actually

them.