Encryption
- Many threats exist to system and network security. Examples include:
- Malware
- Viruses
- Spyware
- Hackers
- Denial of service attacks
- Social engineering
- SQL injection
- Hackers are people who try to gain unlawful or unauthorised access to computers, networks and data by writing programs
- They look for weaknesses in the system and use them to gain access
- Hackers have various motives such as financial gain, a challenge or protests etc
- Hackers sometimes target data in order to steal and use it, or block people from using the data by creating programs called ransomware
- Hackers may also used packet sniffer to intercept and read data transmitted across the internet or a network
- Hackers will often want to use people’s information and therefore it is beneficial to encrypt your data
What is encryption?
- Encryption involves encoding data into a form that is meaningless using an algorithm
- An example could be turning the phrase “Computer Science” into “YekLKEZizFuFjHNCjHj3Md7qyTiGxLNNwPVFZtJU74I=”
- Once encrypted, data can be decrypted which turns the encrypted data into data that can be understood again
- Encryption doesn’t prevent hackers from hacking but makes the data hard if not impossible to understand unless they have matching decryption tools
- There are two types of encryption: symmetric encryption and asymmetric encryption
Exam Tip
- Encryption doesn't stop the data from being stolen. It just makes it very difficult for hackers to understand the data