COMPUTER SCIENCE AND ENGINEERING
SYSTEM SOFTWARE
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
To scramble their data so that unauthorised users can’t access it.
|
|
To scramble their data so that they get confused.
|
|
To clean up the useless data.
|
|
None of the above
|
Detailed explanation-1: -It scrambles data into an unintelligible form that a user can decode or decrypt with the help of cryptographic keys. The primary goal of file encryption is to ensure that files are protected against malicious hackers.
Detailed explanation-2: -With data breaches and identity theft on the rise, encrypting files not only means protecting an organization’s reputation and trustworthiness-it means protecting people and their valuable assets. File encryption is also a key pillar of cybersecurity, with national and global policies requiring its use.
Detailed explanation-3: -Encrypting information protects files from breaches in confidentiality, but the risks of unauthorized or accidental modification (including destruction) and/or denial of use are still real.
Detailed explanation-4: -Encryption with the private key is used to prove authenticity. If person 1 encrypts a message with their own private key then person 2 can decrypt it with person 1’s public key, which proves that person 1 originated the message since it could only have been encrypted with their private key.
Detailed explanation-5: -Encrypting personal data whilst it is being transferred provides effective protection against interception by a third party. You should use encrypted communications channels when transmitting any personal data over an untrusted network.