null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
11695435
encryption
Description
Mind Map on encryption, created by Niamh Leigh on 06/12/2017.
No tags specified
firewall
anti-virus
password
encryption
key stage 3
Mind Map by
Niamh Leigh
, updated more than 1 year ago
More
Less
Created by
Niamh Leigh
almost 7 years ago
25
0
0
Resource summary
encryption
A) encryption uses numbers, letters or symbols as codes to make something private.
B) you encrypt a message by using codes that only certain people know.
C) you decrypt a message by using a code.
D) we use encription to scramble up messages so that people do not know what you are talking about.
it has https and a padlock in the searchbar.
bacause some websites are not secure.
using whatsapp, messaging people, websites, hyperlinks.
Anti-virus
scans the computer all the time.
should be used on email attatchments and when downloading new software
needs regular updating to make sure there are no threats.
used when a program is trying to connect with another
Firewall
used to protect a computer from network intruders.
quarentines any programs or files which are harmfull
prevents harmful data from entering your computer
controls which programs can send and recieve data packets
password
they have a minimum of how many characters there should be in a password.
special code so only certain people know the message/password
passwords should not have a specific rythm/pattern
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Computer Security
Mr A Esch
Flash Ahhh saviour of the universe
James Perry Unkn
security
Kayleigh Fleming
Utility software (firewalls and anti-virus)
Mr A Esch
Utility software
Joshua Price
Computer network
Giovanni Zago
COMPUTER NETWORK SECURITY!
Luke Hashem
Security and sharing features of Microsoft Word
T0ny T
Overall Plan for Encryption - Olivia Hewett
Olivia Hewett
Data-centric Security
Michael Mihalik
Security+ Cryptography
Lyndsay Badding
Browse Library