Topic 29.
Methods of data protection
The most common methods of data protection are passwords, encryption and decryption systems and firewalls.
Passwords
A password is a string of characters that you use to verify your identity or authenticate access to a digital system. They are most commonly used to log in to online accounts in combination with a username or email, but they can also be implemented for other applications such as Wi-Fi, encryption, and device logins.
We all know that keeping your accounts secure is important. In the event of one of your accounts becoming compromised, you could be the victim of fraudulent transactions, identity theft, illegal fund transfers, or other illegal activities.
Encryption
Encryption is the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
Decryption
Decryption converts encrypted data to its original form, making it readable and understandable to authorized users. It is the reverse of encryption.
Check yourself!