Encryption, Changing information (like a message) into a secret code to keep it safe; for example, turning "hello" into "IFMMP.", Decryption, Turning the secret code back into the original message; for example, changing "IFMMP" back to "hello.", Cipher, A set of rules or steps used to change a message into a code; for example, a rule might be “shift every letter one step forward in the alphabet.”, Key, A special piece of information used to lock (encrypt) or unlock (decrypt) the secret code; for example, the key for a cipher might be “shift by 1 letter.”, Plaintext, The original message before it’s turned into a secret code; for example, "hello.", Ciphertext, The secret version of the message after it’s been encrypted; for example, "IFMMP.", Password, A word or phrase used to protect information; for example, like a secret word to open a treasure chest., Hacker, Someone who tries to break into a system to read or change information; for example, someone trying to guess your password., Data, Information stored in computers or messages sent between people; for example, a message, a photo, or a video., Algorithm, A set of instructions or rules a computer follows to solve a problem or do something; for example, a recipe for encrypting a message., Code, A way to hide the meaning of a message using symbols, numbers, or letters; for example, using emojis to represent words (😊 = happy)., Lock and Key, A metaphor for encryption and decryption; for example, encryption is the lock, and the key is needed to open it., Digital Signature, A way to prove who sent a message using encryption; for example, like signing a letter, but with maths!, Caesar Cipher, A simple type of encryption where letters are shifted by a fixed number in the alphabet; for example, “A = D, B = E” with a shift of 3., Secure Website (HTTPS), A type of website that uses encryption to keep information safe when you visit; for example, look for the padlock symbol in the address bar!, Firewall, A virtual "wall" that stops bad messages or hackers from reaching your computer; for example, like a gatekeeper that checks everyone before they enter a castle., End-to-End Encryption, A way to make sure only the sender and the receiver can read the messages; for example, messaging apps like WhatsApp use this to keep chats private., Public and Private Keys, A pair of "keys" used in encryption where the public key locks (encrypts) the message, and the private key unlocks (decrypts) it; for example, this keeps online shopping and banking secure., Cyber Attack, When someone tries to break into a computer or network to steal or damage data; for example, like a thief trying to pick a lock but finding an unbreakable one..
0%
Cryptography keywords
Paylaş
Paylaş
Paylaş
Entrepreneurquizzes
tarafından
Secondary
KS3
Computing
İçeriği Düzenle
Yazdır
Yerleştir
Daha fazla
Ödevler
Skor Tablosu
Daha fazla göster
Daha az göster
Bu lider panosu şu anda gizlidir. Herkese açmak için
Paylaş
'a tıklayın.
Bu lider panosu kaynak sahibi tarafından devre dışı bırakıldı.
Seçenekleriniz kaynak sahibinden farklı olduğu için bu lider panosu devre dışı bırakıldı.
Seçenekleri Eski Haline Döndür
Eşleştir
açık uçlu bir şablondur. Bir lider panosu için skor oluşturmaz.
Giriş gereklidir
Görsel stil
Yazı tipleri
Abonelik gerekli
Seçenekler
Şablonu değiştir
Tümünü göster
Siz etkinliği oynarken daha fazla format görüntülenir.
)
Sonuçları aç
Bağlantıyı kopyala
QR kodu
Sil
Otomatik olarak kaydedilen geri yüklensin mi:
?