0% found this document useful (0 votes)
31 views

Grade 5 Computer

The document discusses cryptography, which is a method of encoding data to protect sensitive information during storage and transmission by converting it into an unreadable format using encryption keys, and only authorized users who possess the decryption key can access the information. It also outlines various methods of ensuring electronic security, including using strong passwords, encrypting files and communications, and being cautious of sharing personal details online.

Uploaded by

Xian Durante
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Grade 5 Computer

The document discusses cryptography, which is a method of encoding data to protect sensitive information during storage and transmission by converting it into an unreadable format using encryption keys, and only authorized users who possess the decryption key can access the information. It also outlines various methods of ensuring electronic security, including using strong passwords, encrypting files and communications, and being cautious of sharing personal details online.

Uploaded by

Xian Durante
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Cryptography

• Cryptography - is a method of storing and transmitting data in a form


that only those it is intended for can read and process.
• It is a science of protecting information by encoding it into an
unreadable format.
• Cryptography is an effective way of protecting sensitive information as
it is stored on media or transmitted through network communication
paths.
• Encryption- It is the process of converting plain text into an
unreadable form (cipher text). It is when you keep the information
through a secret code that only you and another recipient know.
• Decryption – It is the process of converting unreadable form (cipher
text )into a plain text. It is changing the secret code back to its
original form.

• PURPOSE OF CRYTORAPHY AND SECURITY


• 1. Confidentiality of information.
• It ensures that only authorized person can view the information.
• 2. Integrity of the information.
• It ensures that the information is correct and no unauthorized person
or malicious software has altered the data. Enccrypted information
cannot be changed except by authorized users who have the key.
3. Authenticity guarantee of the sender.
-It provides proof of the genuineness of the user.
-Cryptography can prove that the sender was legitimate and not
an impostor.
4. Access Control of the data.
-It ensures that data is accessible to authorized users.
-Authorized users are provided the decryption key to access the
information.
5. Non-repudiation.
-It proves that a user performed an action.
-Cryptography prevents an individual from fraudulently denying that
they were involved in a transaction.

ELECTRONIC SECURITY
6. Personal Security- Make your password so hard to guess.
- Make a very strong password and do not allow google or any app to
remember your password.
2. Search Engines- All search engines track your search history and build
profiles as your personalized data.
3. Bluetooth.
- Be sure to switch off your Bluetooth always.
- Switch it on when you need it only.
- Anybody can get your data when your Bluetooth is on and not
secured.
4. Location Services.
- If not necessary don’t let anybody locate where you are.
5. Social Networking.
- Do not put your birthday, passwords, identification card, and
important details about you.
- Set your privacy settings to your friends only.
6. Cloud Services.
- Protect your files in the cloud with strict sharing capabilities.
Always check to ensure that people you share your link can have an
access to view and edit your files.
- Do not upload in the cloud pictures that can lead to your credit cards and
ATM cards.
7. Web Browsing.
- Do not click advertisement that pop-up in your browsers.
- Be conscious and aware to links that will ask information about you.
8. File Storage.
- If you have important information in your hard disk and USB Flash Disk,be
sure to use the software True Crypt.
9. Email.
- All “free” email and webmail services can trace your messages.
- To keep the content of your messages private, delete it after receiving it.
- Save and delete to assure that you keep your messages to yourself.
10. Encryption.
-Use software that will encrypt and decrypt your hard drive.
- File Vault for Windows and Open PGP can encrypt, depcrypt,
sign and verify emails.

• Information Security is important especially if it will affect personal


information of your parents, your school, and yourself.
• It is better to practice to be secured than to be sorry.
Activity: Secret Code
• Decrypt the code. Write the text by looking at the code.
A B C D E F G H I J K L M
1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z
14 15 16 17 18 19 20 21 22 23 24 25 26

1. 3.
4 – 5 – 3 – 15 – 4 – 5 11 – 5 – 25
2. 4.
19 – 5 – 3 – 18 – 5 – 20 5 – 14 – 3 – 18 – 25 – 16 - 20
5. 8.
3 – 18 – 25 – 16 – 20 – 15 – 7 – 18 16 – 18 – 9 – 22 – 1 – 20 – 5
- 1 - 16 – 8 – 25
6. 9.
5 – 14 – 3 – 15 – 4 – 5 4 – 5 – 3 – 18 – 25 – 16 – 20
7. 10.

13 – 5 – 19 – 19 – 1 – 7 – 5 1 – 21 – 20 – 8 – 5 – 14 – 20 – 9 –
3

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy