Internet Security Things we haven’t discussed in detail: Use the Internet to find information on the following topics: SPAM Phishing Pharming Key term from last time: Encryption Plain text Cipher text Decryption Cryptography Cryptanalysis Break the code (taken from the book so you need to know these…) The web server has a routable IP address. The student’s computer has a non-routable IP address. Explain two differences between routable and non-routable IP addresses. Difference 1: ...................................................................................................................... .......................................................................................................................................... .. Difference 2: ...................................................................................................................... .......................................................................................................................................... .. (2 marks) 1 An operating system is designed to hide the complexities of the hardware from the user and to manage the hardware and other resources. Give three different types of management of either hardware or other resources that are performed by an operating system. 1. 2. 3. (3 marks)