COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Restriction
|
|
Protection
|
|
Encryption
|
|
Prevention
|
Detailed explanation-1: -"Encryptionā€¯ is a term used to describe when information is transformed into an unreadable format unless the reader possesses the appropriate key for decryption.
Detailed explanation-2: -Today, encryption technology uses advanced algorithms to make data unreadable except by those with the correct key. Encryption is a must for businesses protecting sensitive information, such as customer credit card information or government issued data.
Detailed explanation-3: -Encryption Technology is the coding or scrambling of information so that it can only be decoded and read by someone who has the correct decoding key.
Detailed explanation-4: -Phishing is when scam artists send official-looking emails, attempting to fool you into disclosing your personal information-such as user names, passwords, banking records or account numbers, or social security numbers-by replying to the email or entering it on a phone website.