Computer Science, asked by sanayah58, 9 months ago

ent?
h) Explain different kinds of online threats.
i) Explain the use of data encryption.​

Answers

Answered by Anonymous
3

Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.

Answered by Rahul9048
2

Answer:

h) Any kind of software designed to annoy or harm the users is considered malware.  Trojan horses, spyware, adware, ransomware, phishing, viruses, worms, rootkits, and browser hijackers are all types of malware. Malware is usually picked up from the internet or through one’s email.

i) Data encryption translates data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.

Similar questions