The ICT Lounge: Encrypting Data
The ICT Lounge: Encrypting Data
Section 8.8:
Encryption
Encryption is used as a security measure that makes data un-
readable even if it is stolen. Key Concepts of this section:
In this section we discuss encryption and why it is used. # Understand what encryption is.
# Be able to describe why it is important to encrypt
personal or sensitive data.
# Whenever you use a computer device that is connected to the internet, you are potentially
vulnerable to hackers. Examples:
Remember:
Hackers will try and break into your computer in order to steal personal information
like social security numbers and bank/credit card details.
Hackers want this data so that they can commit identity fraud or steal your cash.
# In section 8.3, we discussed methods that we can use to help prevent hackers from
breaking into a computer system.
# If these authentication techniques fail and a hacker breaks into the system, encryption is
another layer of defense for our personal data.
# Encryption works by scrambling data into garbled code using an encryption key.
Only authorised people who have the decryption key will be able to unscramble the
data and read it.
Encryp on turns data into scrambled and unreadable
https://www.ictlounge.com/html/encryption.htm 1/4
3/23/2021 IGCSE ICT - Encrypting Data
nonsense.
An example of encryption:
# Nick wants to send a personal message to Pauline.
Nick wants to encrypt the message so that it can only be read by Pauline.
Encryp on keys are used to encrypt (lock) and decrypt
(unlock) files and data.
# The example below explains how the encryption process works: (Click image to zoom)
Encrypting a file:
No one can read the message without the encryption key. Even if a hacker
intercepts it, all they will see is the garbled nonsense that encryption generated. Medical records can be encrypted.
https://www.ictlounge.com/html/encryption.htm 2/4
3/23/2021 IGCSE ICT - Encrypting Data
Some videos:
# Here are some links to videos that contain more information about encryption:
Click the above task and answer the questions about encryption. Historical Encryption
https://www.ictlounge.com/html/encryption.htm 3/4
3/23/2021 IGCSE ICT - Encrypting Data
Back to top
https://www.ictlounge.com/html/encryption.htm 4/4