SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
How Encryption for Strong
    Security Works
     About File Encryption
     About Link encryption
         About WAN
         About VPN
            Group F




                        How Encryption for Strong Security Works – p.1/6
About File Encryption
      File Encryption is scrambling process in which
  •
      files are made unreadable until the specific
      decryption method has been employed. The most
      common use of software file encryption is to
      protect your private files, documents and
      informations. Cryptography is an old science and
      it has been used for decades by governments and
      armies around the world to protect their
      confidential data. Nowadays, cryptography took
      its place in our computers, allowing ordinary
      users to use the most advanced algorithms to
      protect their private files.


                                      How Encryption for Strong Security Works – p.2/6
About Link encryption
      Link encryption is an approach to
  •
      communications security that encrypts and
      decrypts all traffic at each end of a
      communications line (e.g. a teletype circuit). It
      contrasts with end-to-end encryption where
      messages are encrypted by the sender at the point
      of origin and only decrypted by the intended
      receiver. Link encryption offers a couple of
      advantages:




                                      How Encryption for Strong Security Works – p.3/6
About WAN
     is a computer network that covers a broad area
 •
     (i.e., any network whose communications links
     cross metropolitan, regional, or national
     boundaries ). Less formally, a WAN is a wireless
     network that uses routers and public
     communications links [1]. Contrast with personal
     area networks , local area networks , campus area
     networks , or metropolitan area networks which
     are usually limited to a room, building, campus or
     specific metropolitan area respectively. The
     largest and most well-known example of a WAN
     is the Internet.


                                      How Encryption for Strong Security Works – p.4/6
About VPN
     VPN is a computer network in which some of the
 •
     links between nodes are carried by open
     connections or virtual circuits in some larger
     network instead of by physical wires. The
     link-layer protocols of the virtual network are
     said to be tunneled through the larger network
     when this is the case. One common application is
     secure communications through the public
     Internet, but a VPN need not have explicit
     security features, such as authentication or
     content encryption. VPNs, for example, can be
     used to separate the traffic of different user
     communities over an underlying network with
     strong security features.
                                    How Encryption for Strong Security Works – p.5/6
Reference
     http://ja.wikipedia.org/wiki/Wiki
 •

     http://chiebukuro.yahoo.co.jp/
 •




                                     How Encryption for Strong Security Works – p.6/6

Mais conteúdo relacionado

Mais procurados

02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
sw2 week13
sw2 week13sw2 week13
sw2 week13
s1170113
 
English Week13
English Week13English Week13
English Week13
s1160202
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
s116num
 

Mais procurados (19)

Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security Fundamental
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1
 
Cryptppt1
Cryptppt1Cryptppt1
Cryptppt1
 
Network Security
Network SecurityNetwork Security
Network Security
 
Covert networks
Covert networksCovert networks
Covert networks
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Cisco security
Cisco securityCisco security
Cisco security
 
Steganography
SteganographySteganography
Steganography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
sw2 week13
sw2 week13sw2 week13
sw2 week13
 
Steganography
SteganographySteganography
Steganography
 
English Week13
English Week13English Week13
English Week13
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Web Security
Web SecurityWeb Security
Web Security
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Treball seguretat wifi
Treball seguretat wifiTreball seguretat wifi
Treball seguretat wifi
 

Destaque

积极心态培训
积极心态培训积极心态培训
积极心态培训
20004
 
Lumea.se.schimba
Lumea.se.schimbaLumea.se.schimba
Lumea.se.schimba
Nicky Nic
 
Pietrele misterioase
Pietrele misterioasePietrele misterioase
Pietrele misterioase
Nicky Nic
 
1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi
Nicky Nic
 
1. remedii naturiste
1. remedii naturiste1. remedii naturiste
1. remedii naturiste
Nicky Nic
 
Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)
20004
 
员工胜任力模型及标准
员工胜任力模型及标准员工胜任力模型及标准
员工胜任力模型及标准
20004
 
高效的团队管理
高效的团队管理高效的团队管理
高效的团队管理
20004
 
Sss Felicitare De 8 Martie
Sss Felicitare De 8 MartieSss Felicitare De 8 Martie
Sss Felicitare De 8 Martie
Nicky Nic
 
Nlp致胜行销学
Nlp致胜行销学Nlp致胜行销学
Nlp致胜行销学
20004
 
心态调整及认同
心态调整及认同心态调整及认同
心态调整及认同
20004
 
应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)
20004
 
Fisher sharks
Fisher sharksFisher sharks
Fisher sharks
vermigle
 
Chinatown vocab
Chinatown vocabChinatown vocab
Chinatown vocab
vermigle
 
Mesaje de an nou.
Mesaje de an nou.Mesaje de an nou.
Mesaje de an nou.
Nicky Nic
 
A trip to the firehouse
A trip to the firehouseA trip to the firehouse
A trip to the firehouse
vermigle
 

Destaque (20)

ναυαγιο αντικυθηρων
ναυαγιο αντικυθηρωνναυαγιο αντικυθηρων
ναυαγιο αντικυθηρων
 
积极心态培训
积极心态培训积极心态培训
积极心态培训
 
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
 
Lumea.se.schimba
Lumea.se.schimbaLumea.se.schimba
Lumea.se.schimba
 
Pietrele misterioase
Pietrele misterioasePietrele misterioase
Pietrele misterioase
 
1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi
 
1. remedii naturiste
1. remedii naturiste1. remedii naturiste
1. remedii naturiste
 
Official power point paynes prairie
Official power point   paynes prairieOfficial power point   paynes prairie
Official power point paynes prairie
 
Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)
 
员工胜任力模型及标准
员工胜任力模型及标准员工胜任力模型及标准
员工胜任力模型及标准
 
高效的团队管理
高效的团队管理高效的团队管理
高效的团队管理
 
Sss Felicitare De 8 Martie
Sss Felicitare De 8 MartieSss Felicitare De 8 Martie
Sss Felicitare De 8 Martie
 
2011-04-25 comments on Readability and Consistency for v5 Consultation
2011-04-25  comments on Readability and Consistency for v5 Consultation2011-04-25  comments on Readability and Consistency for v5 Consultation
2011-04-25 comments on Readability and Consistency for v5 Consultation
 
Nlp致胜行销学
Nlp致胜行销学Nlp致胜行销学
Nlp致胜行销学
 
心态调整及认同
心态调整及认同心态调整及认同
心态调整及认同
 
应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)
 
Fisher sharks
Fisher sharksFisher sharks
Fisher sharks
 
Chinatown vocab
Chinatown vocabChinatown vocab
Chinatown vocab
 
Mesaje de an nou.
Mesaje de an nou.Mesaje de an nou.
Mesaje de an nou.
 
A trip to the firehouse
A trip to the firehouseA trip to the firehouse
A trip to the firehouse
 

Semelhante a Web Presen

Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdf
faizasoftic
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
Edie II
 

Semelhante a Web Presen (20)

Week13
Week13Week13
Week13
 
A depth detail about vpn security
A depth detail about vpn securityA depth detail about vpn security
A depth detail about vpn security
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
The vpn
The vpnThe vpn
The vpn
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Vpn
VpnVpn
Vpn
 
Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdf
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
V P N
V P NV P N
V P N
 
Network security
Network security Network security
Network security
 

Mais de guest79a91d (18)

Week14
Week14Week14
Week14
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week14
Week14Week14
Week14
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Web Presen

  • 1. How Encryption for Strong Security Works About File Encryption About Link encryption About WAN About VPN Group F How Encryption for Strong Security Works – p.1/6
  • 2. About File Encryption File Encryption is scrambling process in which • files are made unreadable until the specific decryption method has been employed. The most common use of software file encryption is to protect your private files, documents and informations. Cryptography is an old science and it has been used for decades by governments and armies around the world to protect their confidential data. Nowadays, cryptography took its place in our computers, allowing ordinary users to use the most advanced algorithms to protect their private files. How Encryption for Strong Security Works – p.2/6
  • 3. About Link encryption Link encryption is an approach to • communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a teletype circuit). It contrasts with end-to-end encryption where messages are encrypted by the sender at the point of origin and only decrypted by the intended receiver. Link encryption offers a couple of advantages: How Encryption for Strong Security Works – p.3/6
  • 4. About WAN is a computer network that covers a broad area • (i.e., any network whose communications links cross metropolitan, regional, or national boundaries ). Less formally, a WAN is a wireless network that uses routers and public communications links [1]. Contrast with personal area networks , local area networks , campus area networks , or metropolitan area networks which are usually limited to a room, building, campus or specific metropolitan area respectively. The largest and most well-known example of a WAN is the Internet. How Encryption for Strong Security Works – p.4/6
  • 5. About VPN VPN is a computer network in which some of the • links between nodes are carried by open connections or virtual circuits in some larger network instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. How Encryption for Strong Security Works – p.5/6
  • 6. Reference http://ja.wikipedia.org/wiki/Wiki • http://chiebukuro.yahoo.co.jp/ • How Encryption for Strong Security Works – p.6/6