null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
11695435
encryption
Descripción
Mapa Mental sobre encryption, creado por Niamh Leigh el 06/12/2017.
Sin etiquetas
firewall
anti-virus
password
encryption
key stage 3
Mapa Mental por
Niamh Leigh
, actualizado hace más de 1 año
Más
Menos
Creado por
Niamh Leigh
hace casi 7 años
25
0
0
Resumen del Recurso
encryption
A) encryption uses numbers, letters or symbols as codes to make something private.
B) you encrypt a message by using codes that only certain people know.
C) you decrypt a message by using a code.
D) we use encription to scramble up messages so that people do not know what you are talking about.
it has https and a padlock in the searchbar.
bacause some websites are not secure.
using whatsapp, messaging people, websites, hyperlinks.
Anti-virus
scans the computer all the time.
should be used on email attatchments and when downloading new software
needs regular updating to make sure there are no threats.
used when a program is trying to connect with another
Firewall
used to protect a computer from network intruders.
quarentines any programs or files which are harmfull
prevents harmful data from entering your computer
controls which programs can send and recieve data packets
password
they have a minimum of how many characters there should be in a password.
special code so only certain people know the message/password
passwords should not have a specific rythm/pattern
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Computer Security
Mr A Esch
Flash Ahhh saviour of the universe
James Perry Unkn
security
Kayleigh Fleming
Utility software (firewalls and anti-virus)
Mr A Esch
Utility software
Joshua Price
Computer network
Giovanni Zago
COMPUTER NETWORK SECURITY!
Luke Hashem
Security and sharing features of Microsoft Word
T0ny T
Overall Plan for Encryption - Olivia Hewett
Olivia Hewett
Data-centric Security
Michael Mihalik
Security+ Cryptography
Lyndsay Badding
Explorar la Librería