Note that your final mark will not be saved in the system.
D2 Protecting data GapFill
You must fill all the gaps before clicking ‘Check Answers!’
To securely operate online, computers need to have a security package installed. Usually, this is built in to the , but some people also install a third party package as a replacement. These packages should include at least the following two features.
- software scans and removes files that are infected by a virus or other malware. The software can scan through every file on your computer, usually on demand or a fixed schedule, or automatically detects threats . The program compares each file against a threat database – we call these . But because hundreds of new threats are created each day, there is a delay before the characteristics of the new malware are added to the database. Therefore the program must detect occurring on the system, and the files are sent to a safe storage area called , and samples of the malware may be sent to the program’s creator for analysis.
- can be either software-based, or -based. Both operate in the same way, by blocking traffic to certain in order to stop hackers from entering a system – e.g. by restricting those used for remote desktop services, and the device can sit at the bridge between the internal network and Internet. Business-grade systems can be set up ( ) to block traffic from specific IP addresses or geographical locations.
Packages may also include other tools or utilities (e.g. temporary file removal).
In order to keep our data safe from hackers, we use a process called and use it when storing and sending data. The process means that the contents of the file cannot be read if the file is stolen from a server or storage device, or intercepted as the data travels across a network or the Internet. The unencrypted text is called text, but after encryption it is called text. The most powerful type is called encryption which uses two different , a public and private key which are made up two (public) or one (private) prime number. The larger the numbers, the longer the decryption would take if a hacker tried to decrypt the data by trying to guess those numbers – to the point that it’s virtually impossible to crack it.