Encryption

Description

Mind Map on Encryption, created by Christian Baxter on 10/06/2016.
Christian Baxter
Mind Map by Christian Baxter, updated more than 1 year ago
Christian Baxter
Created by Christian Baxter over 9 years ago
3
0

Resource summary

Encryption
  1. What does it do?
    1. This is a number of letters scrambled to make some kind of code,you can try and crack the code to reveal a message
    2. How would you encrypt a message?
      1. Enter your secret message in some kind of form.(optional) you can download the desktop version.Encipher it,enter your set password to encrypt the message.Voila!
      2. How would you decrypt a message?
        1. Either use the password you set to encrypt the message or try and follow clues to solve the message
          1. Use A key!
          2. When do we use Encryption?
            1. If were trying to send a message to someone and want it to be secret
              1. When we are trying tp protect our personal data/info
              2. Anti-Virus
                1. We need an anti-virus software because it regularly monitors your pc for any viruses and would either try and get rid of it or it would alert you
                  1. (The Anti-virus checks your computer for viruses )
                    1. Looks for malicious software like Trojans,Worms,Zombies and Adware
                    2. Firewall
                      1. Firewall blocks out and prevents viruses entering your computer
                        1. It also quarantines viruses if they reach your computer,so it is very useful
                          1. Sits between a network and the computer so it know whats going in and out
                            1. There are five Different kinds of Firewall:Proxy Firewall,STF Firewall,UTM firewall,NGFW and
                            Show full summary Hide full summary

                            Similar

                            Computer Security
                            Mr A Esch
                            Overall Plan for Encryption - Olivia Hewett
                            Olivia Hewett
                            Data-centric Security
                            Michael Mihalik
                            Security+ Cryptography
                            Lyndsay Badding
                            Software Security Vocabulary
                            Shantal K Green
                            Unit 4 lab 4 pg 2
                            Samuel Melendez
                            Encryption and Security
                            nick.mason1998
                            Encryption
                            George Power
                            encryption
                            Niamh Leigh
                            Encryption Work
                            Alex Rollin
                            PROTECTING PERSONAL DATA
                            Dillani Arulananthan