SlideShare a Scribd company logo
1 of 6
How Encryption For Strong Security Works 1.Networks use data encryption, file encryption, and link encryption for strong security. File encryption protects files in central servers and mass storage devices from being read or changed without an encryption key.
How Encryption For Strong Security Works 2.An encryption program, usually in firmware, uses a string of numbers called a key to create a stream of data combining the real information with a pseudorandom stream of bits.  The real data is buried i the pseudorandom “noise” .  This is calld data encryption.
How Encryption For Strong Security Works 3.The PC's encrypted data, enclosed in unencrypted TCP/IP and Ethernet packets, crosses the network.  Additionally, routers can use encryption between themselves to protect the entire stream of data.  This is called link encryption.
How Encryption For Strong Security Works 4.Local file encryption protects data from physical intrusion.
How Encryption For Strong Security Works 5.VPN client software creates an encrypted tunnel to the firewall/VPN server.
How Encryption For Strong Security Works 6.A VPN is a form of link encryption often used across a private network of the Internet.

More Related Content

What's hot

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityShitiz Upreti
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference Real Estate
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceSrideviM4
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityShafaan Khaliq Bhatti
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Email security
Email securityEmail security
Email securitykumarviji
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
Email security
Email securityEmail security
Email securitySultanErbo
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4Mr Smith
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email securityMazin Alwaaly
 

What's hot (14)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer science
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Email security
Email securityEmail security
Email security
 
Fog
FogFog
Fog
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Email security
Email securityEmail security
Email security
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
Information and data security email security
Information and data security email securityInformation and data security email security
Information and data security email security
 

Viewers also liked

Alcoholismo
AlcoholismoAlcoholismo
Alcoholismojoanlo22
 
Palacio De Peterhof Azoro
Palacio De Peterhof AzoroPalacio De Peterhof Azoro
Palacio De Peterhof AzoroJuan García
 
De Lo Que Es Capaz Nuestro Cerebro
De Lo Que Es Capaz Nuestro CerebroDe Lo Que Es Capaz Nuestro Cerebro
De Lo Que Es Capaz Nuestro CerebroJuan García
 
Electronic portfolio- Top 40
Electronic portfolio- Top 40Electronic portfolio- Top 40
Electronic portfolio- Top 40taylorcockley
 
Peace And Environment Expert Panel U Syd Dan Cass 2009
Peace And Environment Expert Panel U Syd Dan Cass 2009Peace And Environment Expert Panel U Syd Dan Cass 2009
Peace And Environment Expert Panel U Syd Dan Cass 2009Dan Cass
 
Amazing Northern Lights
Amazing Northern LightsAmazing Northern Lights
Amazing Northern LightsThilini
 
Porqueseesconde
PorqueseescondePorqueseesconde
Porqueseescondewposadas
 
Lunasin and Epigenetics: How it affects multiple genes and pathways
Lunasin and Epigenetics: How it affects multiple genes and pathwaysLunasin and Epigenetics: How it affects multiple genes and pathways
Lunasin and Epigenetics: How it affects multiple genes and pathwaysWealth Thru Nutrition
 
Electronic portfolio -best work so far
Electronic portfolio -best work so farElectronic portfolio -best work so far
Electronic portfolio -best work so fartaylorcockley
 
Media timeline for main task
Media timeline for main taskMedia timeline for main task
Media timeline for main tasktaylorcockley
 

Viewers also liked (20)

Alcoholismo
AlcoholismoAlcoholismo
Alcoholismo
 
Palacio De Peterhof Azoro
Palacio De Peterhof AzoroPalacio De Peterhof Azoro
Palacio De Peterhof Azoro
 
De Lo Que Es Capaz Nuestro Cerebro
De Lo Que Es Capaz Nuestro CerebroDe Lo Que Es Capaz Nuestro Cerebro
De Lo Que Es Capaz Nuestro Cerebro
 
Brands+Blogs
Brands+BlogsBrands+Blogs
Brands+Blogs
 
Form Helpers
Form HelpersForm Helpers
Form Helpers
 
Nectar I
Nectar INectar I
Nectar I
 
Electronic portfolio- Top 40
Electronic portfolio- Top 40Electronic portfolio- Top 40
Electronic portfolio- Top 40
 
Niezwykle Rzezby
Niezwykle RzezbyNiezwykle Rzezby
Niezwykle Rzezby
 
2.1.2wire-wound
2.1.2wire-wound2.1.2wire-wound
2.1.2wire-wound
 
Peace And Environment Expert Panel U Syd Dan Cass 2009
Peace And Environment Expert Panel U Syd Dan Cass 2009Peace And Environment Expert Panel U Syd Dan Cass 2009
Peace And Environment Expert Panel U Syd Dan Cass 2009
 
Super Test Diapositivas
Super Test DiapositivasSuper Test Diapositivas
Super Test Diapositivas
 
Amazing Northern Lights
Amazing Northern LightsAmazing Northern Lights
Amazing Northern Lights
 
Porqueseesconde
PorqueseescondePorqueseesconde
Porqueseesconde
 
Lunasin and Epigenetics: How it affects multiple genes and pathways
Lunasin and Epigenetics: How it affects multiple genes and pathwaysLunasin and Epigenetics: How it affects multiple genes and pathways
Lunasin and Epigenetics: How it affects multiple genes and pathways
 
M10 Bonita
M10 BonitaM10 Bonita
M10 Bonita
 
David Copperfield
David CopperfieldDavid Copperfield
David Copperfield
 
Electronic portfolio -best work so far
Electronic portfolio -best work so farElectronic portfolio -best work so far
Electronic portfolio -best work so far
 
Initial ideas
Initial ideasInitial ideas
Initial ideas
 
Humor Grafico
Humor GraficoHumor Grafico
Humor Grafico
 
Media timeline for main task
Media timeline for main taskMedia timeline for main task
Media timeline for main task
 

Similar to Week13

Week13presen
Week13presenWeek13presen
Week13presens1160131
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET Journal
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Damir Delija
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdfVograce
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 

Similar to Week13 (20)

Week13
Week13Week13
Week13
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 
Network security
Network securityNetwork security
Network security
 
Week13presen
Week13presenWeek13presen
Week13presen
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Ip security
Ip security Ip security
Ip security
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Homework4
Homework4Homework4
Homework4
 
IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...Improving data confidentiality in personal computer environment using on line...
Improving data confidentiality in personal computer environment using on line...
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Week13

  • 1. How Encryption For Strong Security Works 1.Networks use data encryption, file encryption, and link encryption for strong security. File encryption protects files in central servers and mass storage devices from being read or changed without an encryption key.
  • 2. How Encryption For Strong Security Works 2.An encryption program, usually in firmware, uses a string of numbers called a key to create a stream of data combining the real information with a pseudorandom stream of bits. The real data is buried i the pseudorandom “noise” . This is calld data encryption.
  • 3. How Encryption For Strong Security Works 3.The PC's encrypted data, enclosed in unencrypted TCP/IP and Ethernet packets, crosses the network. Additionally, routers can use encryption between themselves to protect the entire stream of data. This is called link encryption.
  • 4. How Encryption For Strong Security Works 4.Local file encryption protects data from physical intrusion.
  • 5. How Encryption For Strong Security Works 5.VPN client software creates an encrypted tunnel to the firewall/VPN server.
  • 6. How Encryption For Strong Security Works 6.A VPN is a form of link encryption often used across a private network of the Internet.