SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption for Strong Security
              Works


1. VPN
2. WAN
3.Router
4. Firmware
VPN
    A virtual private
●

    network (VPN) is a
    computer network in
    which some of the
    links between nodes
    are carried by open
    connections or virtual
    circuits in some larger
    network instead of by
    physical wires.
WAN
    WAN is wide area
●

    network. It is a
    computer network that
    covers broad area.
    Less formally, a Wan
    is a wireless network
    that uses routers and
    public
    communications links.
Router
    A router is a
●

    networking device
    whose software and
    hardware are usually
    tailored to the tasks of
    routing and forwarding
    information. For
    example, on the
    Internet, information is
    directed to various
    paths by routers.
Firmware
Software built into
equipment to do basic
control of hardware. It
is called the firmware
from installing in the
equipment fixing, and
no so much addition
of the change as
intermediate existence
of hardware and
software.
Reference


 http://ja.wikipedia.org/
•

•www.fmmc.or.jp

More Related Content

What's hot

Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpnAreeba Gill
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Biplob Orton
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
English for engineering
English for engineeringEnglish for engineering
English for engineeringQoimah Adielah
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12Rishabh-Rawat
 

What's hot (20)

Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Slide.Week13
Slide.Week13Slide.Week13
Slide.Week13
 
Presentation vpn
Presentation vpnPresentation vpn
Presentation vpn
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
 
VPN
VPNVPN
VPN
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
The mfn 3
The mfn 3The mfn 3
The mfn 3
 
English for engineering
English for engineeringEnglish for engineering
English for engineering
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
 
slideshow 2
slideshow 2slideshow 2
slideshow 2
 

Viewers also liked

Viewers also liked (7)

Custom Residence, Vienna, VA
Custom Residence, Vienna, VACustom Residence, Vienna, VA
Custom Residence, Vienna, VA
 
Depression Credit Crisis
Depression Credit CrisisDepression Credit Crisis
Depression Credit Crisis
 
Latest Items from Europe 2016
Latest Items from Europe 2016Latest Items from Europe 2016
Latest Items from Europe 2016
 
Custom Residence, Bainbridge Island, WA
Custom Residence, Bainbridge Island, WACustom Residence, Bainbridge Island, WA
Custom Residence, Bainbridge Island, WA
 
Custom Residence, Great Falls, VA
Custom Residence, Great Falls, VACustom Residence, Great Falls, VA
Custom Residence, Great Falls, VA
 
Video Mailer
Video MailerVideo Mailer
Video Mailer
 
Building blocks for a tangible marketing plan
Building blocks for a tangible marketing planBuilding blocks for a tangible marketing plan
Building blocks for a tangible marketing plan
 

Similar to How Enryption for Strong Security Works

Types of Network
Types of NetworkTypes of Network
Types of NetworkAvishek Kar
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
Computer networking xii
Computer networking  xiiComputer networking  xii
Computer networking xiisaltyp
 
Extended definition
Extended definitionExtended definition
Extended definitiontcassa
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic conceptsIbrahim Mugis
 
computer network - basic concepts
computer network - basic conceptscomputer network - basic concepts
computer network - basic conceptsSithu PM
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networkingchamwama
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Computer networking
Computer networkingComputer networking
Computer networkingtdsparks3
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
Computer networking-revised
Computer networking-revisedComputer networking-revised
Computer networking-revisedjlunceford12
 
Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 

Similar to How Enryption for Strong Security Works (20)

Types of Network
Types of NetworkTypes of Network
Types of Network
 
Networking
NetworkingNetworking
Networking
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Computer networking xii
Computer networking  xiiComputer networking  xii
Computer networking xii
 
Extended definition
Extended definitionExtended definition
Extended definition
 
1 networking
1 networking1 networking
1 networking
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
computer network - basic concepts
computer network - basic conceptscomputer network - basic concepts
computer network - basic concepts
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Computer networking
Computer networkingComputer networking
Computer networking
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Computer networking-revised
Computer networking-revisedComputer networking-revised
Computer networking-revised
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Networks
NetworksNetworks
Networks
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

How Enryption for Strong Security Works

  • 1. How Encryption for Strong Security Works 1. VPN 2. WAN 3.Router 4. Firmware
  • 2. VPN A virtual private ● network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network instead of by physical wires.
  • 3. WAN WAN is wide area ● network. It is a computer network that covers broad area. Less formally, a Wan is a wireless network that uses routers and public communications links.
  • 4. Router A router is a ● networking device whose software and hardware are usually tailored to the tasks of routing and forwarding information. For example, on the Internet, information is directed to various paths by routers.
  • 5. Firmware Software built into equipment to do basic control of hardware. It is called the firmware from installing in the equipment fixing, and no so much addition of the change as intermediate existence of hardware and software.