E N D
Encryption and Hacking Jan 11
Your Answer • Endpoint Encryption for PC (EEPC) is a computer security system that prevents data stored on a hard drive from being read or used by an unauthorized person. With EEPC, users are forced to identify themselves to the security system when the computer is started. This is done by requiring up to three authentication methods:Password • User ID • Token (Loaded on a floppy disk or any ISO 7816 smart card) • If the person accessing the computer fails to enter the correct information, EEPC prevents access to the computer as well as the encrypted data stored within. To gain access to an EEPC protected PC when using a smart card, users must insert their card into the reader when the EEPC authentication screen is displayed, then type their password and optional user ID. After the smart card verifies the password and EEPC has established that the correct token is used, the user is then granted access to the computer.
Your Answer encrypted unreadable decryption Passwords guess secret firewalls recognised
User IDs and passwords June 11 Q5
Your Answer • A) a username is used so that there is less chance of people having the same ID for a website • B) a password is used so that only the user with knowledge of the password may enter and access information
Your Answer • A) Malicious software is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. • B) The school could use an antivirus software which would be able to identify malicious software. The school could also create lots of backups of the documents so that if a malware software got into the school they would still have all of the data.
Your Answer • 1) don’t give out personal information • 2)don’t accept chat room invites from people you don’t know • 3)don’t download anything that is being offered to you by another account • 4)Get a decent anti virus in case the site tries to get you to install something that turns out to be bad