Security - Part 3 Network

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Vocabulary

Proximity:
Padlock:
Scenario:
encrypted:
sniff:
fire wall:
cipher:
glaring:
cryptography:
secret key:
predicated:
public key:
algrithm:
malicious:
Malware:

Questions

How does your network put your information in danger.


How to protect your information from the public network?
What's the trade off of using a VPN?
How does Fire wall protect your information?
What is a Plan text, what is a cipher text, and what is a decrypted text?
What is a glaring flaw to use cipher encrypt method?
What is secret key in cryptography used for?
What is public key in cryptography used for?
What's the relationship between secret key and public key?

What is a Phishing
Define your security zone
Objective

Help student to understand what is a scurity theat around your environment.


Student can tell what are the methods been using to protect our information.
Student can define scurity in their own way

You might also like