How Encryption for Strong Security Works <ul><li>About encryption </li></ul><ul><li>A kind of encryption </li></ul><ul><li...
About encryption Convert data according to the rule that was the same when I exchange the digital data such as a document ...
A kind of encryption <ul><li>Data encryption </li></ul><ul><ul><li>Protects information with a pseudorandom information(it...
About Firewall I control a particular computer network and communication with the outside, and the fire wall is hardware e...
About VPN The service that can use a public line with VPN as if it is a dedicated line. The use with the low cost is possi...
address <ul><li>FOTOSEARCH </li></ul><ul><ul><li>http://www.fotosearch.jp </li></ul></ul><ul><li>Wikipedia(jp) </li></ul><...
Upcoming SlideShare
Loading in …5
×

Wp Week13

251 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
251
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Wp Week13

  1. 1. How Encryption for Strong Security Works <ul><li>About encryption </li></ul><ul><li>A kind of encryption </li></ul><ul><li>About Firewall </li></ul><ul><li>About VPN </li></ul>
  2. 2. About encryption Convert data according to the rule that was the same when I exchange the digital data such as a document or the image through a network.
  3. 3. A kind of encryption <ul><li>Data encryption </li></ul><ul><ul><li>Protects information with a pseudorandom information(it called “noise”). </li></ul></ul><ul><li>File encryption </li></ul><ul><ul><li>For example, it protects files in central server. </li></ul></ul><ul><li>Link encryption </li></ul><ul><ul><li>Protects TCP/IP and Ethernet packets. </li></ul></ul>
  4. 4. About Firewall I control a particular computer network and communication with the outside, and the fire wall is hardware equipped with software aimed at maintaining the security of the internal computer network or the software.
  5. 5. About VPN The service that can use a public line with VPN as if it is a dedicated line. The use with the low cost is possible, but, in a characteristic of the Internet, security and the security of the communication quality become difficult than I use the communications network of the carrier.
  6. 6. address <ul><li>FOTOSEARCH </li></ul><ul><ul><li>http://www.fotosearch.jp </li></ul></ul><ul><li>Wikipedia(jp) </li></ul><ul><ul><li>http://ja.wikipedia.com/ </li></ul></ul><ul><li>E-Words </li></ul><ul><ul><li>http://e-words.jp/ </li></ul></ul>

×