SlideShare a Scribd company logo
1 of 6
How Encryption For Strong Security Works 1.Networks use data encryption, file encryption, and link encryption for strong security. File encryption protects files in central servers and mass storage devices from being read or changed without an encryption key.
How Encryption For Strong Security Works 2.An encryption program, usually in firmware, uses a string of numbers called a key to create a stream of data combining the real information with a pseudorandom stream of bits.  The real data is buried i the pseudorandom “noise” .  This is calld data encryption.
How Encryption For Strong Security Works 3.The PC's encrypted data, enclosed in unencrypted TCP/IP and Ethernet packets, crosses the network.  Additionally, routers can use encryption between themselves to protect the entire stream of data.  This is called link encryption.
How Encryption For Strong Security Works 4.Local file encryption protects data from physical intrusion.
How Encryption For Strong Security Works 5.VPN client software creates an encrypted tunnel to the firewall/VPN server.
How Encryption For Strong Security Works 6.A VPN is a form of link encryption often used across a private network of the Internet.

More Related Content

What's hot

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityShitiz Upreti
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference Real Estate
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceSrideviM4
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Email security
Email securityEmail security
Email securitykumarviji
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
Email security
Email securityEmail security
Email securitySultanErbo
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4Mr Smith
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email securityMazin Alwaaly
 

What's hot (14)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer science
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Email security
Email securityEmail security
Email security
 
Fog
FogFog
Fog
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Email security
Email securityEmail security
Email security
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email security
 

Viewers also liked

Alcoholismo
AlcoholismoAlcoholismo
Alcoholismojoanlo22
 
Palacio De Peterhof Azoro
Palacio De Peterhof AzoroPalacio De Peterhof Azoro
Palacio De Peterhof AzoroJuan García
 
De Lo Que Es Capaz Nuestro Cerebro
De Lo Que Es Capaz Nuestro CerebroDe Lo Que Es Capaz Nuestro Cerebro
De Lo Que Es Capaz Nuestro CerebroJuan García
 
Electronic portfolio- Top 40
Electronic portfolio- Top 40Electronic portfolio- Top 40
Electronic portfolio- Top 40taylorcockley
 
Peace And Environment Expert Panel U Syd Dan Cass 2009
Peace And Environment Expert Panel U Syd Dan Cass 2009Peace And Environment Expert Panel U Syd Dan Cass 2009
Peace And Environment Expert Panel U Syd Dan Cass 2009Dan Cass
 
Amazing Northern Lights
Amazing Northern LightsAmazing Northern Lights
Amazing Northern LightsThilini
 
Porqueseesconde
PorqueseescondePorqueseesconde
Porqueseescondewposadas
 
Lunasin and Epigenetics: How it affects multiple genes and pathways
Lunasin and Epigenetics: How it affects multiple genes and pathwaysLunasin and Epigenetics: How it affects multiple genes and pathways
Lunasin and Epigenetics: How it affects multiple genes and pathwaysWealth Thru Nutrition
 
Electronic portfolio -best work so far
Electronic portfolio -best work so farElectronic portfolio -best work so far
Electronic portfolio -best work so fartaylorcockley
 
Media timeline for main task
Media timeline for main taskMedia timeline for main task
Media timeline for main tasktaylorcockley
 

Viewers also liked (20)

Alcoholismo
AlcoholismoAlcoholismo
Alcoholismo
 
Palacio De Peterhof Azoro
Palacio De Peterhof AzoroPalacio De Peterhof Azoro
Palacio De Peterhof Azoro
 
De Lo Que Es Capaz Nuestro Cerebro
De Lo Que Es Capaz Nuestro CerebroDe Lo Que Es Capaz Nuestro Cerebro
De Lo Que Es Capaz Nuestro Cerebro
 
Brands+Blogs
Brands+BlogsBrands+Blogs
Brands+Blogs
 
Form Helpers
Form HelpersForm Helpers
Form Helpers
 
Nectar I
Nectar INectar I
Nectar I
 
Electronic portfolio- Top 40
Electronic portfolio- Top 40Electronic portfolio- Top 40
Electronic portfolio- Top 40
 
Niezwykle Rzezby
Niezwykle RzezbyNiezwykle Rzezby
Niezwykle Rzezby
 
2.1.2wire-wound
2.1.2wire-wound2.1.2wire-wound
2.1.2wire-wound
 
Peace And Environment Expert Panel U Syd Dan Cass 2009
Peace And Environment Expert Panel U Syd Dan Cass 2009Peace And Environment Expert Panel U Syd Dan Cass 2009
Peace And Environment Expert Panel U Syd Dan Cass 2009
 
Super Test Diapositivas
Super Test DiapositivasSuper Test Diapositivas
Super Test Diapositivas
 
Amazing Northern Lights
Amazing Northern LightsAmazing Northern Lights
Amazing Northern Lights
 
Porqueseesconde
PorqueseescondePorqueseesconde
Porqueseesconde
 
Lunasin and Epigenetics: How it affects multiple genes and pathways
Lunasin and Epigenetics: How it affects multiple genes and pathwaysLunasin and Epigenetics: How it affects multiple genes and pathways
Lunasin and Epigenetics: How it affects multiple genes and pathways
 
M10 Bonita
M10 BonitaM10 Bonita
M10 Bonita
 
David Copperfield
David CopperfieldDavid Copperfield
David Copperfield
 
Electronic portfolio -best work so far
Electronic portfolio -best work so farElectronic portfolio -best work so far
Electronic portfolio -best work so far
 
Initial ideas
Initial ideasInitial ideas
Initial ideas
 
Humor Grafico
Humor GraficoHumor Grafico
Humor Grafico
 
Media timeline for main task
Media timeline for main taskMedia timeline for main task
Media timeline for main task
 

Similar to Week13

Week13presen
Week13presenWeek13presen
Week13presens1160131
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET Journal
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Damir Delija
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdfVograce
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 

Similar to Week13 (20)

Week13
Week13Week13
Week13
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 
Network security
Network securityNetwork security
Network security
 
Week13presen
Week13presenWeek13presen
Week13presen
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Ip security
Ip security Ip security
Ip security
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Homework4
Homework4Homework4
Homework4
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Recently uploaded

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 

Recently uploaded (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 

Week13

  • 1. How Encryption For Strong Security Works 1.Networks use data encryption, file encryption, and link encryption for strong security. File encryption protects files in central servers and mass storage devices from being read or changed without an encryption key.
  • 2. How Encryption For Strong Security Works 2.An encryption program, usually in firmware, uses a string of numbers called a key to create a stream of data combining the real information with a pseudorandom stream of bits. The real data is buried i the pseudorandom “noise” . This is calld data encryption.
  • 3. How Encryption For Strong Security Works 3.The PC's encrypted data, enclosed in unencrypted TCP/IP and Ethernet packets, crosses the network. Additionally, routers can use encryption between themselves to protect the entire stream of data. This is called link encryption.
  • 4. How Encryption For Strong Security Works 4.Local file encryption protects data from physical intrusion.
  • 5. How Encryption For Strong Security Works 5.VPN client software creates an encrypted tunnel to the firewall/VPN server.
  • 6. How Encryption For Strong Security Works 6.A VPN is a form of link encryption often used across a private network of the Internet.