encryption Flashcards

1
Q

What can I do to protect my data?

A
  • A good password is easy to remember, but hard for someone else to guess it
  • If your password is your pets name, your birthdate etc. it will be easy to guess
  • Use multi factor identification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the 3 levels of password protection

A

Singe factor identification - something you know, your password might be ‘password’
* Two factor identification - something you know + something you possess (for example, your phone sending you a code)
Multi factor identification - something you know + something you possess +something you are (for example, your fingerprint, your face ID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

how do you protect your device from viruses

A
  • Virus software scanning
  • Updating system software
    Data protection is a moving target! It’s important to keep your software up to ate and use the best authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the ceaser cipher

A

· Julius Caesar is reported to have encrypted messages to his soldiers by using a simple alphabetic shift.
· Shift of 4
· Need to agree in advance so people know - like a protocol
· Used for hundreds of years after Caesar died.
· Check the letter frequency analysis.
· They count up the frequency.
· It was a blow to the security g the Caesar cipher.
Always go’s to the right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is brute force

A

· Keep kicking the house until the door falls down.
· If you brake unto a locker - use description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

whats encryption

A

Many of the ideas we use to keep secrets in the digital age are far older than the internet. It helps to protect users’ information, using “walls.”

· The process of encoding a plain text message in some secret way is called encryption.
· The process that reverses encryption, taking secret message and reproducing the original plain text is called decryption.
· We turn it in to cyphertext.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly