Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

Published in: Technology
  • Be the first to comment


  1. 1. Encryption Presented By: Aaina katyal
  2. 2. Contents <ul><li>Introduction to Encryption </li></ul><ul><li>Why is encryption necessary? </li></ul><ul><li>Benefits of Data Encryption </li></ul><ul><li>How to encrypt a file in </li></ul><ul><li>Windows XP </li></ul><ul><li>Types of Encryption </li></ul><ul><li>Common terms </li></ul>
  3. 3. <ul><li>Introduction to Encryption </li></ul><ul><li>Encryption is the conversion of data into a form, that cannot be easily understood by unauthorized people </li></ul><ul><li>The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have </li></ul><ul><li>access to a secret key that enables </li></ul><ul><li>you to decrypt it. </li></ul><ul><li>Plain text </li></ul><ul><li>Cipher text. </li></ul>
  4. 4. Why is encryption necessary? <ul><li>Encryption is taking straight text and scrambling it for security purposes. </li></ul><ul><li>It's like a Locker system. You put any valuables and lock it using a code. The necessity of encryption is mainly to </li></ul><ul><li>protect your documents </li></ul>
  5. 5. Benefits of Data Encryption <ul><li>Flexibility </li></ul><ul><li>Transparency </li></ul>
  6. 6. Process
  7. 7. How to encrypt a file <ul><li>Click Start, point to </li></ul><ul><li>All Programs, point to </li></ul><ul><li>Accessories, and then </li></ul><ul><li>click Windows Explorer. </li></ul>
  8. 8. <ul><li>If you want to encrypt only the file, click Encrypt the file only, and then click OK. </li></ul><ul><li>If you want to encrypt the file and the folder in which it is located, click Encrypt the file and the parent folder, and then click ok. </li></ul>
  9. 9. <ul><li>Symmetric </li></ul><ul><li>- same secret, password or key is used to encrypt and to decrypt. </li></ul><ul><li>Asymmetric </li></ul><ul><li>- It uses two different keys - a public key and a  private key . </li></ul>
  10. 10. <ul><li>Common Terms </li></ul><ul><li>Encrypt </li></ul><ul><li>- To alter information using a code . </li></ul><ul><li>Decrypt </li></ul><ul><li>- Process of converting encrypted data back into its original form. </li></ul><ul><li>Public key and Private key </li></ul>