2. Encryption is the conversion of
data into a form, called
a ciphertext that cannot be easily
understood by unauthorized
people. Decryption is the process
of converting encrypted data back
into its original form also known
as plaintext, so it can be
understood. It is relied on by the
computer security to make sure
that no one unauthorized to see
the data sees it.
3. There are two types on encryption, one of them is:
Symmetric encryption, also known as secret key
encryption. This is the oldest and best-known technique for
encryption. A secret key (in which users share a common
key), which can be a number, a word, or just a string of
random letters, is applied to the text of a message to change
the content in a particular way. This might be by shifting
each letter by a number of places in the alphabet. As long as
both sender and recipient know the secret key, they can
encrypt and decrypt all messages that use this key.
4. The other type of encryption is:
Asymmetric encryption, this is also known as public key
encryption. This is where there are two related keys (a key
pair). A public key (where different keys are used for
encryption and decryption) is made freely available to
anyone who might want to send you a message. A second,
private key is kept secret, so that only you know it. Any
message (text, binary files, or documents) that are
encrypted by using the public key can only be decrypted by
applying the same algorithm, but by using the matching
private key. Any message that is encrypted by using the
private key can only be decrypted by using the matching
public key.
5. When: Use encryption when you don’t trust both the
network and CDP Server and the people that administrate
them. However if you do trust them then you may see no
benefit in using encryption. Also you probably don’t need
encryption if you have backups of your documents.
Why: The reason why you should use encryption is
because is prevents unauthorised access to documents and
e-mail messages. along with this it protects data over the
network and data stored in the CDP Server. This prevents
hackers form getting into your computer and viewing and
deleting your very important documents like essays for
school work or important documents related to your job
which you only have.
6. The difference between encryption
and programming languages like
python and scratch is that in
encryption you are writing a code so
no one unauthorised can see what
you have wrote. On the other
hand, when you write codes in python
or scratch you are writing it so the
computer can understand.
8. Please note that Nash Productions only uses
sources for research, information and
references that are reliable and accurate. To
insure this happens Nash Productions cross
checks the data, and checks if it is a secure
source.
If you have any problems with the information
or any of the references in this presentation or
if you have any other inquiries, then please do
not hesitate in calling Nash Productions
inquiry line on: 447404338651
or email us at: nash786@hotmail.co.uk
Thank You