SlideShare a Scribd company logo
1 of 6
How Encryption For Strong Security
             Works


 1.Networks use data encryption, file encryption,
      and link encryption for strong security.
File encryption protects files in central servers and
mass storage devices from being read or changed
             without an encryption key.
How Encryption For Strong Security
             Works


2.An encryption program, usually in firmware, uses
a string of numbers called a key to create a stream
   of data combining the real information with a
  pseudorandom stream of bits. The real data is
 buried i the pseudorandom “noise” . This is calld
                  data encryption.
How Encryption For Strong Security
              Works


       3.The PC's encrypted data, enclosed in
unencrypted TCP/IP and Ethernet packets, crosses
     the network. Additionally, routers can use
   encryption between themselves to protect the
entire stream of data. This is called link encryption.
How Encryption For Strong Security
              Works



4.Local file encryption protects data from physical
                      intrusion.
How Encryption For Strong Security
             Works



5.VPN client software creates an encrypted tunnel
           to the firewall/VPN server.
How Encryption For Strong Security
             Works



6.A VPN is a form of link encryption often used
   across a private network of the Internet.

More Related Content

What's hot

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 

What's hot (14)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network security
Network securityNetwork security
Network security
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Fog
FogFog
Fog
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network security
Network securityNetwork security
Network security
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Cisco security
Cisco securityCisco security
Cisco security
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
Itc chapter # 11
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 

Viewers also liked

Hasta Donde Dios Me Quiera Llevar.
Hasta Donde Dios Me Quiera Llevar.Hasta Donde Dios Me Quiera Llevar.
Hasta Donde Dios Me Quiera Llevar.
Juan García
 
M4 Artists Thanks
M4 Artists ThanksM4 Artists Thanks
M4 Artists Thanks
Future News
 
Analysis of horror opening new
Analysis of horror opening newAnalysis of horror opening new
Analysis of horror opening new
taylorcockley
 
La Historia De La Mujer
La Historia De La MujerLa Historia De La Mujer
La Historia De La Mujer
Juan García
 

Viewers also liked (6)

Hasta Donde Dios Me Quiera Llevar.
Hasta Donde Dios Me Quiera Llevar.Hasta Donde Dios Me Quiera Llevar.
Hasta Donde Dios Me Quiera Llevar.
 
Los Tres Leones
Los Tres LeonesLos Tres Leones
Los Tres Leones
 
M4 Artists Thanks
M4 Artists ThanksM4 Artists Thanks
M4 Artists Thanks
 
Analysis of horror opening new
Analysis of horror opening newAnalysis of horror opening new
Analysis of horror opening new
 
My best Work so far
My best Work so farMy best Work so far
My best Work so far
 
La Historia De La Mujer
La Historia De La MujerLa Historia De La Mujer
La Historia De La Mujer
 

Similar to Week13

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
s1170087
 

Similar to Week13 (20)

Week13
Week13Week13
Week13
 
Week13presen
Week13presenWeek13presen
Week13presen
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 
Network security
Network securityNetwork security
Network security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
Homework4
Homework4Homework4
Homework4
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Week13

  • 1. How Encryption For Strong Security Works 1.Networks use data encryption, file encryption, and link encryption for strong security. File encryption protects files in central servers and mass storage devices from being read or changed without an encryption key.
  • 2. How Encryption For Strong Security Works 2.An encryption program, usually in firmware, uses a string of numbers called a key to create a stream of data combining the real information with a pseudorandom stream of bits. The real data is buried i the pseudorandom “noise” . This is calld data encryption.
  • 3. How Encryption For Strong Security Works 3.The PC's encrypted data, enclosed in unencrypted TCP/IP and Ethernet packets, crosses the network. Additionally, routers can use encryption between themselves to protect the entire stream of data. This is called link encryption.
  • 4. How Encryption For Strong Security Works 4.Local file encryption protects data from physical intrusion.
  • 5. How Encryption For Strong Security Works 5.VPN client software creates an encrypted tunnel to the firewall/VPN server.
  • 6. How Encryption For Strong Security Works 6.A VPN is a form of link encryption often used across a private network of the Internet.