0% found this document useful (0 votes)
430 views4 pages

The ICT Lounge: Encrypting Data

Encryption is used to scramble data into an unreadable format using an encryption key. This prevents hackers from accessing sensitive personal information even if data is stolen. The encryption process involves using an encryption key to lock data, which can only be unlocked by the intended recipient who has the decryption key. It is important to encrypt files containing financial, medical or identity information when transmitting data over the internet or email.

Uploaded by

Jedediah Phiri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
430 views4 pages

The ICT Lounge: Encrypting Data

Encryption is used to scramble data into an unreadable format using an encryption key. This prevents hackers from accessing sensitive personal information even if data is stolen. The encryption process involves using an encryption key to lock data, which can only be unlocked by the intended recipient who has the decryption key. It is important to encrypt files containing financial, medical or identity information when transmitting data over the internet or email.

Uploaded by

Jedediah Phiri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

3/23/2021 IGCSE ICT - Encrypting Data

The ICT Lounge

Section 8.8:
Encryption
Encryption is used as a security measure that makes data un-
readable even if it is stolen. Key Concepts of this section:

In this section we discuss encryption and why it is used. # Understand what encryption is.
# Be able to describe why it is important to encrypt
personal or sensitive data.

Encrypting data Key Words:


Encryption Key, Encrypt,
What is encryption? Decrypt.

# Whenever you use a computer device that is connected to the internet, you are potentially
vulnerable to hackers. Examples:

Remember:
Hackers will try and break into your computer in order to steal personal information
like social security numbers and bank/credit card details.

Hackers want this data so that they can commit identity fraud or steal your cash.

# In section 8.3, we discussed methods that we can use to help prevent hackers from
breaking into a computer system.

We talked about the following authentication techniques:


Encryp on locks data and stops it from being read by
User-Id's and Passwords unauthorised people.
Biometrics (eye scans, fingerprint scans etc.).

# If these authentication techniques fail and a hacker breaks into the system, encryption is
another layer of defense for our personal data.

# Encryption works by scrambling data into garbled code using an encryption key.

# Even if data is stolen, it cannot be understood by the thief.

Only authorised people who have the decryption key will be able to unscramble the
data and read it.
Encryp on turns data into scrambled and unreadable

https://www.ictlounge.com/html/encryption.htm 1/4
3/23/2021 IGCSE ICT - Encrypting Data
nonsense.

Encryption doesn’t actually prevent hackers from accessing the data.

It just stops them from being able to read or use it.

An example of encryption:
# Nick wants to send a personal message to Pauline.

Nick wants to encrypt the message so that it can only be read by Pauline.
Encryp on keys are used to encrypt (lock) and decrypt
(unlock) files and data.
# The example below explains how the encryption process works: (Click image to zoom)

Encrypting a file:

1. Nick first needs to create an encryption key.

The key will usually be a very long random


number.

2. Nick will now give Pauline a copy of the


encryption key.

Word documents can be encrypted.


3. Nick can now encrypt (lock) the personal
message using encryption software and the
encryption key.
Once encrypted, the message will just look like
scrambled nonsense.

4. Nick can now send the encrypted message to


Pauline via the internet.

No one can read the message without the encryption key. Even if a hacker
intercepts it, all they will see is the garbled nonsense that encryption generated. Medical records can be encrypted.

5. When Pauline receives the message, she will use


her copy of the encryption key to decrypt
(unlock) the message.

https://www.ictlounge.com/html/encryption.htm 2/4
3/23/2021 IGCSE ICT - Encrypting Data

6. Pauline can now read the message sent by The


Nick.

When should you use encryption?


# It is a good idea to use encryption and stop unauthorised people from reading your data
in the following circumstances:

Any files containing bank account or credit card data


When buying items on the internet using credit/bank cards
Any data containing confidential medial records Email messages can be encrypted.
Emails that you wish to remain private
Any data that could be used to commit identity fraud (social security numbers,
insurance numbers etc.).

Some videos:
# Here are some links to videos that contain more information about encryption:

PLACE VIDEOS HERE

Activity! In fact, you can encrypt any type of computer data.


Security with encryption - Research Sheet

Click the above task and answer the questions about encryption. Historical Encryption

People have always looked for ways


to keep their messages secret:

Julius Caesar communicated battle


plans with his generals in code.

Mary Queen of Scot’s plans to take


the English throne from Queen
Elizabeth were hidden in code.

Both the Allies and the Germans


transmitted messages in code. They
also both tried to devise devices that
could break the coded messages.

Previous - Security in Moderated and Next - Computer Viruses


Un-moderated Forums

https://www.ictlounge.com/html/encryption.htm 3/4
3/23/2021 IGCSE ICT - Encrypting Data

Please add your questions/comments below:

0 Comments ictlounge 🔒 Disqus' Privacy Policy  Shephat Alex Phiri

 Recommend 6 t Tweet f Share Sort by Newest

Start the discussion…

Be the first to comment.

✉ Subscribe d Add Disqus to your siteAdd DisqusAdd ⚠ Do Not Sell My Data

Links to Theory Units:


Section 1: Types and Components of Computer Systems Section 2: Input and Output Devices Section 3: Storage Devices and Media
Section 4: Networks and the Effects of using them Section 5: The Effects of using ICT Section 6: ICT Applications
Section 7: The Systems Life Cycle Section 8: Safety and Security Section 9: Audience
Section 10: Communication

Links to Practical Units:


Section 11: File Management Section 12: Images Section 13: layout
Section 14: Styles Section 15: Proofing Section 16: Graphs and Charts
Section 17: Document Production Section 18: Data Manipulation Section 19: Presentations
Section 20: Data Analysis Section 21: Website Authoring

Back to top

https://www.ictlounge.com/html/encryption.htm 4/4

You might also like