SlideShare uma empresa Scribd logo
How Encryption for Strong Security Works Group Web Presentation Week13 s1160003 Katsushige Asahara s1160004 Haruka Anazawa s1160016 Junko Isii
Data Encryption Data encryption is the conversion of data into a form, called a cipher, that cannot be understood by unauthorized people.
File Encryption To protect files and folders from attackers,  users use the Encrypting File System(EFS). The EFS is available in Microsoft's Windows 2000 and  later OS. EFS works by encrypting a file with a symmetric key and a user's public key. To decrypt the file, user needs user's private key and the symmetric key.
Link Encryption The link encryption is a phased protection of the data that trade-off between two points in  the network provided by encrypting data separately in each network link.
VPN The service that can use a public line as if it is a dedicated line. It is used for connection between the footholds of the network in the company, and it is cost-cut than I introduce a dedicated line into the backbone of the carrier by I “ride together”, and doing it.
Encryption program Encryption program,usually in firmware, use a string of numbers called a key to create a stream of data combining the real information.

Mais conteúdo relacionado

Destaque

Recreating the Wheel is for Cavemen!
Recreating the Wheelis for Cavemen!Recreating the Wheelis for Cavemen!
Recreating the Wheel is for Cavemen!Kym Harrington
 
Ffr11 Capital Appeal Communication Slide Base 09.05.11
Ffr11 Capital Appeal Communication Slide Base 09.05.11Ffr11 Capital Appeal Communication Slide Base 09.05.11
Ffr11 Capital Appeal Communication Slide Base 09.05.11JohnIFC
 
Hsbc Breakfast 2011
Hsbc Breakfast 2011Hsbc Breakfast 2011
Hsbc Breakfast 2011JohnIFC
 
Ifc Fundraiserpreneur 22.06.10
Ifc Fundraiserpreneur 22.06.10Ifc Fundraiserpreneur 22.06.10
Ifc Fundraiserpreneur 22.06.10JohnIFC
 
Starting To Fundraise 2011
Starting To Fundraise 2011Starting To Fundraise 2011
Starting To Fundraise 2011JohnIFC
 
Ifc & Capital Appeals 10.02.11
Ifc & Capital Appeals 10.02.11Ifc & Capital Appeals 10.02.11
Ifc & Capital Appeals 10.02.11JohnIFC
 

Destaque (7)

Recreating the Wheel is for Cavemen!
Recreating the Wheelis for Cavemen!Recreating the Wheelis for Cavemen!
Recreating the Wheel is for Cavemen!
 
Ffr11 Capital Appeal Communication Slide Base 09.05.11
Ffr11 Capital Appeal Communication Slide Base 09.05.11Ffr11 Capital Appeal Communication Slide Base 09.05.11
Ffr11 Capital Appeal Communication Slide Base 09.05.11
 
Hsbc Breakfast 2011
Hsbc Breakfast 2011Hsbc Breakfast 2011
Hsbc Breakfast 2011
 
Ifc Fundraiserpreneur 22.06.10
Ifc Fundraiserpreneur 22.06.10Ifc Fundraiserpreneur 22.06.10
Ifc Fundraiserpreneur 22.06.10
 
Starting To Fundraise 2011
Starting To Fundraise 2011Starting To Fundraise 2011
Starting To Fundraise 2011
 
Ifc & Capital Appeals 10.02.11
Ifc & Capital Appeals 10.02.11Ifc & Capital Appeals 10.02.11
Ifc & Capital Appeals 10.02.11
 
Goog 411
Goog 411Goog 411
Goog 411
 

Semelhante a Week13presen

Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec bigchill29
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13I M
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016 Mukesh Pathak
 

Semelhante a Week13presen (20)

Week13presentation
Week13presentationWeek13presentation
Week13presentation
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Security F
Security FSecurity F
Security F
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
INTRODUCTION
INTRODUCTIONINTRODUCTION
INTRODUCTION
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Network Security 2016
Network Security 2016 Network Security 2016
Network Security 2016
 
presenw13
presenw13presenw13
presenw13
 

Último

IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyUXDXConf
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfAnthony Lucente
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfalexjohnson7307
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXUXDXConf
 

Último (20)

IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in Technology
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdf
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Transforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UXTransforming The New York Times: Empowering Evolution through UX
Transforming The New York Times: Empowering Evolution through UX
 

Week13presen

  • 1. How Encryption for Strong Security Works Group Web Presentation Week13 s1160003 Katsushige Asahara s1160004 Haruka Anazawa s1160016 Junko Isii
  • 2. Data Encryption Data encryption is the conversion of data into a form, called a cipher, that cannot be understood by unauthorized people.
  • 3. File Encryption To protect files and folders from attackers, users use the Encrypting File System(EFS). The EFS is available in Microsoft's Windows 2000 and later OS. EFS works by encrypting a file with a symmetric key and a user's public key. To decrypt the file, user needs user's private key and the symmetric key.
  • 4. Link Encryption The link encryption is a phased protection of the data that trade-off between two points in the network provided by encrypting data separately in each network link.
  • 5. VPN The service that can use a public line as if it is a dedicated line. It is used for connection between the footholds of the network in the company, and it is cost-cut than I introduce a dedicated line into the backbone of the carrier by I “ride together”, and doing it.
  • 6. Encryption program Encryption program,usually in firmware, use a string of numbers called a key to create a stream of data combining the real information.