Name 5 methods of internet security.
What are firewalls?
What is stateful inspection?
What are proxy servers?
What is packet filtering?
What is symmetric encryption?
In symmetric encryption, the sender and receiver share the same private key. The same key is used to encrypt and decrypt data sent between the two parties
What is a major flaw in symmetric encryption?
-The sender and receiver must participate in a key exchange which can be vulnerable to interception.
What is asymmetric encryption?
How does asymmetric encryption avoid being vulnerable to interception.
-It uses a public and private, so there’s no key exchange, so the key can’t be intercepted
What are digital signatures used for?
Used to verify
What type of encryption do digital signatures use?
Asymmetric encryption
How are digital signatures created?
What happens when the recipient receives the message with the digital signature?
What is a digital certificate used for?
Who issues digital certificates and what 5 things do digital certificates contain?
Issued by certificate authorities, digital certificates contain:
Name the three types of malware that can infect computers
What are worms?
What are Trojan horses?
What are Viruses?
How can we prevent malware?
What are two differences between viruses and worms?
- Worms do not generally hide themselves inside another file