110 likes | 254 Views
Encryption and Hacking. Jan 11. Encryption is used to jumble up words to stop unauthorised users understanding the data. Without encryption many companies would have a lot more problems with hacking. Your Answer. Your Answer. Encypted. Unreadable. Decryption. Passwords. Guess. Secret.
E N D
Encryption and Hacking Jan 11 Encryption is used to jumble up words to stop unauthorised users understanding the data. Without encryption many companies would have a lot more problems with hacking.
Your Answer Encypted Unreadable Decryption Passwords Guess Secret Firewalls Recognised
User IDs and passwords A username is a name that the system uses to identify you A password confirms that it is you trying to log on June 11 Q5
Malware Malicious software is usually installed through an advert or link but sometimes hidden iside legitimate software. It is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Malware includes computer viruses, ransomware, worms, trojanhorses. The school could use anti virus software The school could also use website scans to check that there is no malicious software on that site.
Protect your personal information. Never give out your phone number, address, real name, or other identifying information when chatting in a chat room. Choose a screen name that does not reveal your real identity. Avoid going into a private chat room with someone you have never chatted with before. Notify the moderator of the chat room site, or flag the message of anyone in the chat room that acts inappropriately or makes you feel threatened or uncomfortable.