SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption for Strong
    Security Works
     About File Encryption
     About Link encryption
         About WAN
         About VPN
            Group F




                        How Encryption for Strong Security Works – p.1/6
About File Encryption
      File Encryption is scrambling process in which
  •
      files are made unreadable until the specific
      decryption method has been employed. The most
      common use of software file encryption is to
      protect your private files, documents and
      informations. Cryptography is an old science and
      it has been used for decades by governments and
      armies around the world to protect their
      confidential data. Nowadays, cryptography took
      its place in our computers, allowing ordinary
      users to use the most advanced algorithms to
      protect their private files.


                                      How Encryption for Strong Security Works – p.2/6
About Link encryption
      Link encryption is an approach to
  •
      communications security that encrypts and
      decrypts all traffic at each end of a
      communications line (e.g. a teletype circuit). It
      contrasts with end-to-end encryption where
      messages are encrypted by the sender at the point
      of origin and only decrypted by the intended
      receiver. Link encryption offers a couple of
      advantages:




                                      How Encryption for Strong Security Works – p.3/6
About WAN
     is a computer network that covers a broad area
 •
     (i.e., any network whose communications links
     cross metropolitan, regional, or national
     boundaries ). Less formally, a WAN is a wireless
     network that uses routers and public
     communications links [1]. Contrast with personal
     area networks , local area networks , campus area
     networks , or metropolitan area networks which
     are usually limited to a room, building, campus or
     specific metropolitan area respectively. The
     largest and most well-known example of a WAN
     is the Internet.


                                      How Encryption for Strong Security Works – p.4/6
About VPN
     VPN is a computer network in which some of the
 •
     links between nodes are carried by open
     connections or virtual circuits in some larger
     network instead of by physical wires. The
     link-layer protocols of the virtual network are
     said to be tunneled through the larger network
     when this is the case. One common application is
     secure communications through the public
     Internet, but a VPN need not have explicit
     security features, such as authentication or
     content encryption. VPNs, for example, can be
     used to separate the traffic of different user
     communities over an underlying network with
     strong security features.
                                    How Encryption for Strong Security Works – p.5/6
Reference
     http://ja.wikipedia.org/wiki/Wiki
 •

     http://chiebukuro.yahoo.co.jp/
 •




                                     How Encryption for Strong Security Works – p.6/6

More Related Content

What's hot

Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security FundamentalMousmi Pawar
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of securityGemy Chan
 
Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...SandipAryal5
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1Ryan Mc Donagh
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkMohak Kaushik
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyAdri Jovin
 
sw2 week13
sw2 week13sw2 week13
sw2 week13s1170113
 
English Week13
English Week13English Week13
English Week13s1160202
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
Web Security
Web SecurityWeb Security
Web SecurityADIEFEH
 
Firewall
FirewallFirewall
FirewallGarmian
 
Treball seguretat wifi
Treball seguretat wifiTreball seguretat wifi
Treball seguretat wifiJorgeAnayaSanz
 

What's hot (19)

Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security Fundamental
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1
 
Cryptppt1
Cryptppt1Cryptppt1
Cryptppt1
 
Network Security
Network SecurityNetwork Security
Network Security
 
Covert networks
Covert networksCovert networks
Covert networks
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Cisco security
Cisco securityCisco security
Cisco security
 
Steganography
SteganographySteganography
Steganography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
sw2 week13
sw2 week13sw2 week13
sw2 week13
 
Steganography
SteganographySteganography
Steganography
 
English Week13
English Week13English Week13
English Week13
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Web Security
Web SecurityWeb Security
Web Security
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Treball seguretat wifi
Treball seguretat wifiTreball seguretat wifi
Treball seguretat wifi
 

Viewers also liked

ναυαγιο αντικυθηρων
ναυαγιο αντικυθηρωνναυαγιο αντικυθηρων
ναυαγιο αντικυθηρωνgymnasio
 
积极心态培训
积极心态培训积极心态培训
积极心态培训20004
 
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013sistra
 
Lumea.se.schimba
Lumea.se.schimbaLumea.se.schimba
Lumea.se.schimbaNicky Nic
 
Pietrele misterioase
Pietrele misterioasePietrele misterioase
Pietrele misterioaseNicky Nic
 
1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumiNicky Nic
 
1. remedii naturiste
1. remedii naturiste1. remedii naturiste
1. remedii naturisteNicky Nic
 
Official power point paynes prairie
Official power point   paynes prairieOfficial power point   paynes prairie
Official power point paynes prairieRobbyBarbaro
 
Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)20004
 
员工胜任力模型及标准
员工胜任力模型及标准员工胜任力模型及标准
员工胜任力模型及标准20004
 
高效的团队管理
高效的团队管理高效的团队管理
高效的团队管理20004
 
Sss Felicitare De 8 Martie
Sss Felicitare De 8 MartieSss Felicitare De 8 Martie
Sss Felicitare De 8 MartieNicky Nic
 
2011-04-25 comments on Readability and Consistency for v5 Consultation
2011-04-25  comments on Readability and Consistency for v5 Consultation2011-04-25  comments on Readability and Consistency for v5 Consultation
2011-04-25 comments on Readability and Consistency for v5 Consultationit-workforce.com
 
Nlp致胜行销学
Nlp致胜行销学Nlp致胜行销学
Nlp致胜行销学20004
 
心态调整及认同
心态调整及认同心态调整及认同
心态调整及认同20004
 
应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)20004
 
Fisher sharks
Fisher sharksFisher sharks
Fisher sharksvermigle
 
Chinatown vocab
Chinatown vocabChinatown vocab
Chinatown vocabvermigle
 
Mesaje de an nou.
Mesaje de an nou.Mesaje de an nou.
Mesaje de an nou.Nicky Nic
 
A trip to the firehouse
A trip to the firehouseA trip to the firehouse
A trip to the firehousevermigle
 

Viewers also liked (20)

ναυαγιο αντικυθηρων
ναυαγιο αντικυθηρωνναυαγιο αντικυθηρων
ναυαγιο αντικυθηρων
 
积极心态培训
积极心态培训积极心态培训
积极心态培训
 
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
 
Lumea.se.schimba
Lumea.se.schimbaLumea.se.schimba
Lumea.se.schimba
 
Pietrele misterioase
Pietrele misterioasePietrele misterioase
Pietrele misterioase
 
1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi
 
1. remedii naturiste
1. remedii naturiste1. remedii naturiste
1. remedii naturiste
 
Official power point paynes prairie
Official power point   paynes prairieOfficial power point   paynes prairie
Official power point paynes prairie
 
Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)
 
员工胜任力模型及标准
员工胜任力模型及标准员工胜任力模型及标准
员工胜任力模型及标准
 
高效的团队管理
高效的团队管理高效的团队管理
高效的团队管理
 
Sss Felicitare De 8 Martie
Sss Felicitare De 8 MartieSss Felicitare De 8 Martie
Sss Felicitare De 8 Martie
 
2011-04-25 comments on Readability and Consistency for v5 Consultation
2011-04-25  comments on Readability and Consistency for v5 Consultation2011-04-25  comments on Readability and Consistency for v5 Consultation
2011-04-25 comments on Readability and Consistency for v5 Consultation
 
Nlp致胜行销学
Nlp致胜行销学Nlp致胜行销学
Nlp致胜行销学
 
心态调整及认同
心态调整及认同心态调整及认同
心态调整及认同
 
应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)
 
Fisher sharks
Fisher sharksFisher sharks
Fisher sharks
 
Chinatown vocab
Chinatown vocabChinatown vocab
Chinatown vocab
 
Mesaje de an nou.
Mesaje de an nou.Mesaje de an nou.
Mesaje de an nou.
 
A trip to the firehouse
A trip to the firehouseA trip to the firehouse
A trip to the firehouse
 

Similar to Web Presen

A depth detail about vpn security
A depth detail about vpn securityA depth detail about vpn security
A depth detail about vpn securityEric Fedewa
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAVSAHU55
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual NetworksNicole Gomez
 
Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdffaizasoftic
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasureEdie II
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkadeelahmed0345
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdfVograce
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...EditorJST
 

Similar to Web Presen (20)

Week13
Week13Week13
Week13
 
A depth detail about vpn security
A depth detail about vpn securityA depth detail about vpn security
A depth detail about vpn security
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
The vpn
The vpnThe vpn
The vpn
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Vpn
VpnVpn
Vpn
 
Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdf
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
V P N
V P NV P N
V P N
 
Network security
Network security Network security
Network security
 

More from guest79a91d (18)

Week14
Week14Week14
Week14
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week14
Week14Week14
Week14
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Web Presen

  • 1. How Encryption for Strong Security Works About File Encryption About Link encryption About WAN About VPN Group F How Encryption for Strong Security Works – p.1/6
  • 2. About File Encryption File Encryption is scrambling process in which • files are made unreadable until the specific decryption method has been employed. The most common use of software file encryption is to protect your private files, documents and informations. Cryptography is an old science and it has been used for decades by governments and armies around the world to protect their confidential data. Nowadays, cryptography took its place in our computers, allowing ordinary users to use the most advanced algorithms to protect their private files. How Encryption for Strong Security Works – p.2/6
  • 3. About Link encryption Link encryption is an approach to • communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a teletype circuit). It contrasts with end-to-end encryption where messages are encrypted by the sender at the point of origin and only decrypted by the intended receiver. Link encryption offers a couple of advantages: How Encryption for Strong Security Works – p.3/6
  • 4. About WAN is a computer network that covers a broad area • (i.e., any network whose communications links cross metropolitan, regional, or national boundaries ). Less formally, a WAN is a wireless network that uses routers and public communications links [1]. Contrast with personal area networks , local area networks , campus area networks , or metropolitan area networks which are usually limited to a room, building, campus or specific metropolitan area respectively. The largest and most well-known example of a WAN is the Internet. How Encryption for Strong Security Works – p.4/6
  • 5. About VPN VPN is a computer network in which some of the • links between nodes are carried by open connections or virtual circuits in some larger network instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. How Encryption for Strong Security Works – p.5/6
  • 6. Reference http://ja.wikipedia.org/wiki/Wiki • http://chiebukuro.yahoo.co.jp/ • How Encryption for Strong Security Works – p.6/6