SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption For Strong Security
Works
1.Networks use data encryption, file encryption,
and link encryption for strong security.
File encryption protects files in central servers and
mass storage devices from being read or changed
without an encryption key.
How Encryption For Strong Security
Works
2.An encryption program, usually in firmware,
uses a string of numbers called a key to create a
stream of data combining the real information with
a pseudorandom stream of bits. The real data is
buried i the pseudorandom “noise” . This is calld
data encryption.
How Encryption For Strong Security
Works
3.The PC's encrypted data, enclosed in
unencrypted TCP/IP and Ethernet packets,
crosses the network. Additionally, routers can
use encryption between themselves to protect the
entire stream of data. This is called link
encryption.
How Encryption For Strong Security
Works
4.Local file encryption protects data from physical
intrusion.
How Encryption For Strong Security
Works
5.VPN client software creates an encrypted tunnel
to the firewall/VPN server.
How Encryption For Strong Security
Works
6.A VPN is a form of link encryption often used
across a private network of the Internet.

More Related Content

What's hot

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityShitiz Upreti
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference Real Estate
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceSrideviM4
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Email security
Email securityEmail security
Email securitykumarviji
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
Email security
Email securityEmail security
Email securitySultanErbo
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4Mr Smith
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email securityMazin Alwaaly
 

What's hot (14)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer science
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Email security
Email securityEmail security
Email security
 
Fog
FogFog
Fog
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Email security
Email securityEmail security
Email security
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email security
 

Viewers also liked (9)

Issued raised by media ownership
Issued raised by media ownershipIssued raised by media ownership
Issued raised by media ownership
 
Week13
Week13Week13
Week13
 
Edit Decision List
Edit Decision ListEdit Decision List
Edit Decision List
 
Oracinporlanoche
OracinporlanocheOracinporlanoche
Oracinporlanoche
 
Frases
FrasesFrases
Frases
 
APORTACION
APORTACIONAPORTACION
APORTACION
 
Hermosisima Inversion
Hermosisima InversionHermosisima Inversion
Hermosisima Inversion
 
Fotos tarso
Fotos tarsoFotos tarso
Fotos tarso
 
Fotos Inceribles
Fotos InceriblesFotos Inceribles
Fotos Inceribles
 

Week13

  • 1. How Encryption For Strong Security Works 1.Networks use data encryption, file encryption, and link encryption for strong security. File encryption protects files in central servers and mass storage devices from being read or changed without an encryption key.
  • 2. How Encryption For Strong Security Works 2.An encryption program, usually in firmware, uses a string of numbers called a key to create a stream of data combining the real information with a pseudorandom stream of bits. The real data is buried i the pseudorandom “noise” . This is calld data encryption.
  • 3. How Encryption For Strong Security Works 3.The PC's encrypted data, enclosed in unencrypted TCP/IP and Ethernet packets, crosses the network. Additionally, routers can use encryption between themselves to protect the entire stream of data. This is called link encryption.
  • 4. How Encryption For Strong Security Works 4.Local file encryption protects data from physical intrusion.
  • 5. How Encryption For Strong Security Works 5.VPN client software creates an encrypted tunnel to the firewall/VPN server.
  • 6. How Encryption For Strong Security Works 6.A VPN is a form of link encryption often used across a private network of the Internet.