SlideShare a Scribd company logo
1 of 6
How Encryption For Strong Security
             Works


 1.Networks use data encryption, file encryption,
      and link encryption for strong security.
File encryption protects files in central servers and
mass storage devices from being read or changed
             without an encryption key.
How Encryption For Strong Security
             Works


2.An encryption program, usually in firmware, uses
a string of numbers called a key to create a stream
   of data combining the real information with a
  pseudorandom stream of bits. The real data is
 buried i the pseudorandom “noise” . This is calld
                  data encryption.
How Encryption For Strong Security
              Works


       3.The PC's encrypted data, enclosed in
unencrypted TCP/IP and Ethernet packets, crosses
     the network. Additionally, routers can use
   encryption between themselves to protect the
entire stream of data. This is called link encryption.
How Encryption For Strong Security
              Works



4.Local file encryption protects data from physical
                      intrusion.
How Encryption For Strong Security
             Works



5.VPN client software creates an encrypted tunnel
           to the firewall/VPN server.
How Encryption For Strong Security
             Works



6.A VPN is a form of link encryption often used
   across a private network of the Internet.

More Related Content

What's hot

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 

What's hot (14)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network security
Network securityNetwork security
Network security
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Fog
FogFog
Fog
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network security
Network securityNetwork security
Network security
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Cisco security
Cisco securityCisco security
Cisco security
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
Itc chapter # 11
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 

Viewers also liked

Jay Christensen-Networking Presentation
Jay Christensen-Networking PresentationJay Christensen-Networking Presentation
Jay Christensen-Networking Presentation
Jay Christensen
 
Tim Huthert Folio
Tim Huthert FolioTim Huthert Folio
Tim Huthert Folio
thuthert
 
Jay Christensen Networking Presentation
Jay Christensen Networking PresentationJay Christensen Networking Presentation
Jay Christensen Networking Presentation
Jay Christensen
 
A Business Interoperability Framework for Government by Christine Stephenson
A Business Interoperability Framework for Government by Christine StephensonA Business Interoperability Framework for Government by Christine Stephenson
A Business Interoperability Framework for Government by Christine Stephenson
Craig Martin
 
Leading Business Disruption Strategy with EA - Hugh Evans
Leading Business Disruption Strategy with EA - Hugh EvansLeading Business Disruption Strategy with EA - Hugh Evans
Leading Business Disruption Strategy with EA - Hugh Evans
Craig Martin
 

Viewers also liked (13)

The New City Story July 27
The New City Story July 27The New City Story July 27
The New City Story July 27
 
Jay Christensen-Networking Presentation
Jay Christensen-Networking PresentationJay Christensen-Networking Presentation
Jay Christensen-Networking Presentation
 
Lighting Examples
Lighting ExamplesLighting Examples
Lighting Examples
 
Week13
Week13Week13
Week13
 
Tim Huthert Folio
Tim Huthert FolioTim Huthert Folio
Tim Huthert Folio
 
Jay Christensen Networking Presentation
Jay Christensen Networking PresentationJay Christensen Networking Presentation
Jay Christensen Networking Presentation
 
Beat Presentation
Beat PresentationBeat Presentation
Beat Presentation
 
A Business Interoperability Framework for Government by Christine Stephenson
A Business Interoperability Framework for Government by Christine StephensonA Business Interoperability Framework for Government by Christine Stephenson
A Business Interoperability Framework for Government by Christine Stephenson
 
Looking for Disruptive Business Models in Higher Education
Looking for Disruptive Business Models in Higher EducationLooking for Disruptive Business Models in Higher Education
Looking for Disruptive Business Models in Higher Education
 
Design of Business in an Age of Disruption
Design of Business in an Age of DisruptionDesign of Business in an Age of Disruption
Design of Business in an Age of Disruption
 
Using Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategyUsing Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategy
 
Leading Business Disruption Strategy with EA - Hugh Evans
Leading Business Disruption Strategy with EA - Hugh EvansLeading Business Disruption Strategy with EA - Hugh Evans
Leading Business Disruption Strategy with EA - Hugh Evans
 
Riverbed and HPE services for Office 365
Riverbed and HPE services for Office 365Riverbed and HPE services for Office 365
Riverbed and HPE services for Office 365
 

Similar to Week13

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
s1170087
 

Similar to Week13 (20)

Week13
Week13Week13
Week13
 
Week13presen
Week13presenWeek13presen
Week13presen
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 
Network security
Network securityNetwork security
Network security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORMSECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
SECURE SENSITIVE DATA SHARING ON BIG DATA PLATFORM
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
Homework4
Homework4Homework4
Homework4
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Week13

  • 1. How Encryption For Strong Security Works 1.Networks use data encryption, file encryption, and link encryption for strong security. File encryption protects files in central servers and mass storage devices from being read or changed without an encryption key.
  • 2. How Encryption For Strong Security Works 2.An encryption program, usually in firmware, uses a string of numbers called a key to create a stream of data combining the real information with a pseudorandom stream of bits. The real data is buried i the pseudorandom “noise” . This is calld data encryption.
  • 3. How Encryption For Strong Security Works 3.The PC's encrypted data, enclosed in unencrypted TCP/IP and Ethernet packets, crosses the network. Additionally, routers can use encryption between themselves to protect the entire stream of data. This is called link encryption.
  • 4. How Encryption For Strong Security Works 4.Local file encryption protects data from physical intrusion.
  • 5. How Encryption For Strong Security Works 5.VPN client software creates an encrypted tunnel to the firewall/VPN server.
  • 6. How Encryption For Strong Security Works 6.A VPN is a form of link encryption often used across a private network of the Internet.