Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
125
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
3
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. How Encryption for Strong Security Works About File Encryption About Link encryption About WAN About VPN Group F How Encryption for Strong Security Works – p.1/6
  • 2. About File Encryption File Encryption is scrambling process in which • files are made unreadable until the specific decryption method has been employed. The most common use of software file encryption is to protect your private files, documents and informations. Cryptography is an old science and it has been used for decades by governments and armies around the world to protect their confidential data. Nowadays, cryptography took its place in our computers, allowing ordinary users to use the most advanced algorithms to protect their private files. How Encryption for Strong Security Works – p.2/6
  • 3. About Link encryption Link encryption is an approach to • communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a teletype circuit). It contrasts with end-to-end encryption where messages are encrypted by the sender at the point of origin and only decrypted by the intended receiver. Link encryption offers a couple of advantages: How Encryption for Strong Security Works – p.3/6
  • 4. About WAN is a computer network that covers a broad area • (i.e., any network whose communications links cross metropolitan, regional, or national boundaries ). Less formally, a WAN is a wireless network that uses routers and public communications links [1]. Contrast with personal area networks , local area networks , campus area networks , or metropolitan area networks which are usually limited to a room, building, campus or specific metropolitan area respectively. The largest and most well-known example of a WAN is the Internet. How Encryption for Strong Security Works – p.4/6
  • 5. About VPN VPN is a computer network in which some of the • links between nodes are carried by open connections or virtual circuits in some larger network instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. How Encryption for Strong Security Works – p.5/6
  • 6. Reference http://ja.wikipedia.org/wiki/Wiki • http://chiebukuro.yahoo.co.jp/ • How Encryption for Strong Security Works – p.6/6