Knowledge Organiser 20 Preventing cyber security threats & encryption
Terms in this set (10)
Software designed to protect a computer in one of 3 ways: preventing installation of harmful software, preventing important files from being changed, scanning for virus activity on the system and removing as appropriate. Antimalware protects against worms, Trojan Horses, spyware, adware and keyloggers.
Software designed to protect against viruses.
New malware is released regularly and so anti-malware definitions must be up-to-date to protect form the latest viruses.
Hardware or software designed to prevent unauthorised access to or from a private network or intranet. All messages entering or leaving the network will pass through the firewall to be examined.
In a networked environment such as a school or a company, multiple users use many of the computers. Passwords should be strong (Not easy to guess, lower and uppercase letters, numbers, symbols).
Part of an access control procedure for computer systems, which allows a system administrator to set up a hierarchy of users. Thus, the low-level users can access only a limited set of information.
Changing data before transmission so someone can only decipher it with the appropriate key to unlock information. Interceptors would find the message unintelligible.
A cryptographic key is a string of bits used by a cryptographic algorithm to transform plain text into cipher text or vice versa. This key remains private and ensures secure communication.
Symmetric Key encryption
A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.
Asymmetric key encryption
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric).
OTHER SETS BY THIS CREATOR
y9 Computing - 2.1b Standard Algorithms (Search/Sort)
y9 Algorithms: Linear Search, Binary Search, Bubble Sort, Insertion Sort