Information Protection Methods
Questions:
1. Fill in the table
|
1. |
Computer Security |
Network Security |
Internet Security |
Information Security |
|
What do you know about these security types? |
|
|
|
|
2. Explain (in detail) what encryption is.
![]() |
3. Explain (in detail) what decryption is.
![]() |
4.
Explain
what an encryption key is used for.
5.
Explain
what a decryption key is used for.
6. Encryption doesn’t actually stop hackers from stealing our data. Describe what security encryption does provide.
![]() |
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.