Encryption, Changing information (like a message) into a secret code to keep it safe; for example, turning "hello" into "IFMMP.", Decryption, Turning the secret code back into the original message; for example, changing "IFMMP" back to "hello.", Cipher, A set of rules or steps used to change a message into a code; for example, a rule might be “shift every letter one step forward in the alphabet.”, Key, A special piece of information used to lock (encrypt) or unlock (decrypt) the secret code; for example, the key for a cipher might be “shift by 1 letter.”, Plaintext, The original message before it’s turned into a secret code; for example, "hello.", Ciphertext, The secret version of the message after it’s been encrypted; for example, "IFMMP.", Password, A word or phrase used to protect information; for example, like a secret word to open a treasure chest., Hacker, Someone who tries to break into a system to read or change information; for example, someone trying to guess your password., Data, Information stored in computers or messages sent between people; for example, a message, a photo, or a video., Algorithm, A set of instructions or rules a computer follows to solve a problem or do something; for example, a recipe for encrypting a message., Code, A way to hide the meaning of a message using symbols, numbers, or letters; for example, using emojis to represent words (😊 = happy)., Lock and Key, A metaphor for encryption and decryption; for example, encryption is the lock, and the key is needed to open it., Digital Signature, A way to prove who sent a message using encryption; for example, like signing a letter, but with maths!, Caesar Cipher, A simple type of encryption where letters are shifted by a fixed number in the alphabet; for example, “A = D, B = E” with a shift of 3., Secure Website (HTTPS), A type of website that uses encryption to keep information safe when you visit; for example, look for the padlock symbol in the address bar!, Firewall, A virtual "wall" that stops bad messages or hackers from reaching your computer; for example, like a gatekeeper that checks everyone before they enter a castle., End-to-End Encryption, A way to make sure only the sender and the receiver can read the messages; for example, messaging apps like WhatsApp use this to keep chats private., Public and Private Keys, A pair of "keys" used in encryption where the public key locks (encrypts) the message, and the private key unlocks (decrypts) it; for example, this keeps online shopping and banking secure., Cyber Attack, When someone tries to break into a computer or network to steal or damage data; for example, like a thief trying to pick a lock but finding an unbreakable one..
0%
Cryptography keywords
Teilen
Teilen
Teilen
von
Entrepreneurquizzes
Secondary
KS3
Computing
Inhalt bearbeiten
Drucken
Einbetten
Mehr
Zuweisungen
Bestenliste
Mehr anzeigen
Weniger anzeigen
Diese Bestenliste ist derzeit privat. Klicke auf
Teilen
um sie öffentlich zu machen.
Diese Bestenliste wurde vom Eigentümer der Ressource deaktiviert.
Diese Bestenliste ist deaktiviert, da sich Ihre Einstellungen von denen des Eigentümer der Ressource unterscheiden.
Einstellungen zurücksetzen
It's a Match
ist eine Vorlage mit offenem Ende. Es generiert keine Punkte für eine Bestenliste.
Anmelden erforderlich
Visueller Stil
Schriftarten
Abonnement erforderlich
Einstellungen
Vorlage ändern
Alle anzeigen
Weitere Formate werden angezeigt, wenn du die Aktivität spielst.
)
Offene Ergebnisse
Link kopieren
QR-Code
Löschen
Soll die automatisch gespeicherte Aktivität
wiederhergestellt werden?