Please enable JavaScript.
Coggle requires JavaScript to display documents.
Group 1 - Coggle Diagram
Group 1
b. Cipher Text
-
- Created through an encryption algorithm (aka. cipher)
c. Decryption
It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password.
-
-
- Explain Encryption Technologies
takes plain text, like a text message or email, and scrambles it into an unreadable format — called “cipher text.
-Symmetric encryption uses a single password to encrypt and decrypt data.
-Asymmetric encryption uses two keys for encryption and decryption. A public key, which is shared among users, encrypts the data. A private key, which is not shared, decrypts the data.
a process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.
- Determine how encryption can protect data from being altered
Encryption helps protect your online privacy by turning personal information into “for your eyes only” messages intended only for the parties that need them — and no one else.
You should make sure that your emails are being sent over an encrypted connection, or that you are encrypting each message.
Most email clients come with the option for encryption in their Settings menu. If you check your email with a web browser, take a moment to ensure that SSL encryption is available.