Thursday, 11 October 2012

D2

Justify the protocol transmission type you used. Ensure you find positive and negative aspects for the protocol and suggest a second way you could have sent the contact.

You should change your password regulary, to make sure you do not get hacked. This means it can not to damage and your data will be safe, also don't give out too much information incase poeple that are around you hear what you are saying about your personal stuff, and keeping your data safe. Just make sure you don't tell anyone at all. Keep your files in a place where you will remeber where you are putting them, so you can find them. There are viruses also that can cause alot of damage to keeping your date safe so make you don't download too much. Always log out of what you have logged in to aswell, because this can cause to some hacking. 

Most Wi-Fi hubs are encrypted so that you will not be hacked and your information will not get stolen or seen. - 





this was my work for M1 


all together my m1 was about changing your password regulary so you will not and you have not been hacked, and then you will know that its 100% safe, and only you know your password, unless you give it to other people.

The negative things about this would be, if your changing your password so many times and you have so much you might  forget it because you will have other passwords in your head, so make sure you write it down every time and it is something simple. 

The positive things about this would mean this is a safe way to have your password, and if you do write it down then you are good and you should be fine, but it really helps to change your password regularly in-case anyone knows it or try and gets on to it. 

You can send the contact through email if you want, copy and paste what ever you want to and just send it to the person you wan't. Or on to a memory stick through your computer saying your files onto it then uploading it to whatever you want it on. 

The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to keep it safe. 

3 comments:

  1. No. The task is asking how the various protocols keep data safe. You have missed the point. Mention what encryption methods are used.

    ReplyDelete