Internet Security

Internet Security - Private University of Technology...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Private University of Technology Miss Takoua Becha Academic Year: 2010 / 2011 …………………………… …………………………………. . , There are many benefits from an open system like the internet but one of the risks is that we are often exposed to hackers who break into computer systems , , . just for fun to steal information or to spread viruses So how do we go about making our online transactions secure? ……………………………………………… Private networks can be attached by intruders who attempt to obtain information , . such as Social Security numbers bank accounts or research and business reports , To protect crucial data companies hire security consultants who analyze the risks . and provide solutions The most common methods of protection are passwords for , access control firewalls , . and encryption and decryption systems Encryption . changes data into a secret code so that only someone with a key can read it . Decryption converts encrypted data back into its original form ………………………………………………. . , As your email travels across the Net it is copied temporarily onto many . computers in between This means that it can be read by people who illegally . enter computer systems The only way to protect a message is to put it in a sort - , of virtual envelope that is to encode it with some form of encryption . A system , designed to send email privately is Pretty Good Privacy a freeware program . written by Phil Zimmerman …………………………………………………. , Malicious software are programs designed to infiltrate or damage your computer
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 3

Internet Security - Private University of Technology...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online