Encryption, Changing information (like a message) into a secret code to keep it safe; for example, turning "hello" into "IFMMP.", Decryption, Turning the secret code back into the original message; for example, changing "IFMMP" back to "hello.", Cipher, A set of rules or steps used to change a message into a code; for example, a rule might be “shift every letter one step forward in the alphabet.”, Key, A special piece of information used to lock (encrypt) or unlock (decrypt) the secret code; for example, the key for a cipher might be “shift by 1 letter.”, Plaintext, The original message before it’s turned into a secret code; for example, "hello.", Ciphertext, The secret version of the message after it’s been encrypted; for example, "IFMMP.", Password, A word or phrase used to protect information; for example, like a secret word to open a treasure chest., Hacker, Someone who tries to break into a system to read or change information; for example, someone trying to guess your password., Data, Information stored in computers or messages sent between people; for example, a message, a photo, or a video., Algorithm, A set of instructions or rules a computer follows to solve a problem or do something; for example, a recipe for encrypting a message., Code, A way to hide the meaning of a message using symbols, numbers, or letters; for example, using emojis to represent words (😊 = happy)., Lock and Key, A metaphor for encryption and decryption; for example, encryption is the lock, and the key is needed to open it., Digital Signature, A way to prove who sent a message using encryption; for example, like signing a letter, but with maths!, Caesar Cipher, A simple type of encryption where letters are shifted by a fixed number in the alphabet; for example, “A = D, B = E” with a shift of 3., Secure Website (HTTPS), A type of website that uses encryption to keep information safe when you visit; for example, look for the padlock symbol in the address bar!, Firewall, A virtual "wall" that stops bad messages or hackers from reaching your computer; for example, like a gatekeeper that checks everyone before they enter a castle., End-to-End Encryption, A way to make sure only the sender and the receiver can read the messages; for example, messaging apps like WhatsApp use this to keep chats private., Public and Private Keys, A pair of "keys" used in encryption where the public key locks (encrypts) the message, and the private key unlocks (decrypts) it; for example, this keeps online shopping and banking secure., Cyber Attack, When someone tries to break into a computer or network to steal or damage data; for example, like a thief trying to pick a lock but finding an unbreakable one..
0%
Cryptography keywords
Подели
Подели
Подели
аутор
Entrepreneurquizzes
Secondary
KS3
Computing
Уреди садржај
Одштампај
Угради
Више
Задатке
Табела
Прикажи више
Прикажи мање
Ова табела је тренутно приватна. Кликните на
Подели
да бисте је објавили.
Приступ табели је онемогућио власник средства.
Ова табела је онемогућена пошто Вам се подешавања разликују од подешавања власника средства.
Врати подешавања
Споји
је отворени шаблон. Он не генерише резултате за табелу рангирања.
Пријава је обавезна
Визуелни стил
Фонтове
Потребна је претплата
Поставке
Промени шаблон
Прикажи све
Више формата ће се појавити током играња активности.
)
Отворени резултати
Копирај везу
QР кôд
Избриши
Врати аутоматски сачувано:
?