Features of a strong password
Virus
How to minimise the risk
Minimise risk:
Spyware
How to minimise the risk
Minimise risk:
Hacking
How to minimise the risk
The act of gaining illegal access to a computer system without the owner’s consent/permission
Minimise risk:
How does anti-virus software protect the user?
Firewall
Software that filters data coming from the Internet, to stop malware and hackers and block unsuitable content
5 ways that data could be accidentally damaged or accidentally lost
Methods to prevent data entry errors that can accidentally cause data corruption
Explain what is meant by a denial of service (DoS) attack.
Proxy server
A computer that acts as an intermediary between a web browser and the Internet
Advantages of a proxy server
Transport Layer Security (TLS)
The TLS security protocol checks that the website you are using is real and then establishes a private link between two devices that are communicating, using encryption
Secure Sockets Layer (SSL)
SSL security protocol has different methods of encryption to TLS and is less secure; uses public and private keys, uses https
*purpose is the same as TLS (check authentication of website, establish private communication between devices using encryption)
Encryption
The process of converting plain text into cypher text
Decryption
The process of converting cypher text into plain text
Symmetric VS Asymmetric encryption
Symmetric encryption
- Uses the same encryption key to encrypt and decrypt a message (1 key)
- The secret key has to be sent over the Internet before encryption can begin, so anyone who finds out the key can decrypt the messages
Asymmetric encryption
- 2 keys: a public key and a private key
- The public key is shared with any computer that needs to send a message
- The private key is kept secret on your computer. Only your computer can use it to decrypt the messages sent to you
- slower than symmetric, but safer
What will increase the strength of the encryption?
+ explain
Increasing the length of a key and making it more complex
- will generate more possibilities for key
Phishing
How to minimise the risk
Minimise risk:
Pharming
How to minimise the risk
Minimise risk:
4 examples of biometrics
Cracking
How to minimise the risk
Minimise risk:
6 ways of preventing ACCIDENTAL loss or corruption of data
5 tasks carried out by a firewall
How does anti-spyware software work?