SlideShare uma empresa Scribd logo
1 de 6
How Encryption for Strong Security Works Group Web Presentation Week13 s1160003 Katsushige Asahara s1160004 Haruka Anazawa s1160016 Junko Isii
Data Encryption Data encryption is the conversion of data into a form, called a cipher, that cannot be understood by unauthorized people.
File Encryption To protect files and folders from attackers,  users use the Encrypting File System(EFS). The EFS is available in Microsoft's Windows 2000 and  later OS. EFS works by encrypting a file with a symmetric key and a user's public key. To decrypt the file, user needs user's private key and the symmetric key.
Link Encryption The link encryption is a phased protection of the data that trade-off between two points in  the network provided by encrypting data separately in each network link.
VPN The service that can use a public line as if it is a dedicated line. It is used for connection between the footholds of the network in the company, and it is cost-cut than I introduce a dedicated line into the backbone of the carrier by I “ride together”, and doing it.
Encryption program Encryption program,usually in firmware, use a string of numbers called a key to create a stream of data combining the real information.

Mais conteúdo relacionado

Destaque (7)

Recreating the Wheel is for Cavemen!
Recreating the Wheelis for Cavemen!Recreating the Wheelis for Cavemen!
Recreating the Wheel is for Cavemen!
 
Ffr11 Capital Appeal Communication Slide Base 09.05.11
Ffr11 Capital Appeal Communication Slide Base 09.05.11Ffr11 Capital Appeal Communication Slide Base 09.05.11
Ffr11 Capital Appeal Communication Slide Base 09.05.11
 
Hsbc Breakfast 2011
Hsbc Breakfast 2011Hsbc Breakfast 2011
Hsbc Breakfast 2011
 
Ifc Fundraiserpreneur 22.06.10
Ifc Fundraiserpreneur 22.06.10Ifc Fundraiserpreneur 22.06.10
Ifc Fundraiserpreneur 22.06.10
 
Starting To Fundraise 2011
Starting To Fundraise 2011Starting To Fundraise 2011
Starting To Fundraise 2011
 
Ifc & Capital Appeals 10.02.11
Ifc & Capital Appeals 10.02.11Ifc & Capital Appeals 10.02.11
Ifc & Capital Appeals 10.02.11
 
Goog 411
Goog 411Goog 411
Goog 411
 

Semelhante a Week13presen

Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
s116num
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
s1170087
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
bigchill29
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
I M
 

Semelhante a Week13presen (20)

Week13presentation
Week13presentationWeek13presentation
Week13presentation
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Security F
Security FSecurity F
Security F
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
 
presenw13
presenw13presenw13
presenw13
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Week13presen

  • 1. How Encryption for Strong Security Works Group Web Presentation Week13 s1160003 Katsushige Asahara s1160004 Haruka Anazawa s1160016 Junko Isii
  • 2. Data Encryption Data encryption is the conversion of data into a form, called a cipher, that cannot be understood by unauthorized people.
  • 3. File Encryption To protect files and folders from attackers, users use the Encrypting File System(EFS). The EFS is available in Microsoft's Windows 2000 and later OS. EFS works by encrypting a file with a symmetric key and a user's public key. To decrypt the file, user needs user's private key and the symmetric key.
  • 4. Link Encryption The link encryption is a phased protection of the data that trade-off between two points in the network provided by encrypting data separately in each network link.
  • 5. VPN The service that can use a public line as if it is a dedicated line. It is used for connection between the footholds of the network in the company, and it is cost-cut than I introduce a dedicated line into the backbone of the carrier by I “ride together”, and doing it.
  • 6. Encryption program Encryption program,usually in firmware, use a string of numbers called a key to create a stream of data combining the real information.