SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption for Strong
Security Works
  1; Fire wall

  2; About VPN

  3; About Film ware

  4; Encryption        s1170117 Fumiya Nagashima
                       s1170138 Kentaro Okawa
                       s1170139 Yoshihide Okazaki
                       s1170143 Ryo Kawamukai
Fire wall
Fire wall is aimed software
or hardware as for the
control of the
communication
between a certain specific
computer network and the
outside, and the
maintenance
 of the safety of an internal
computer network.
About VPN

The service that can use a
public line with VPN as if it
is a dedicated line.

Because data is protected
and managed strictly by the
attestation and the
encryption, the dangers
such as the leakages and
tapping are low.
About Firmware
Firmware is equipment written
software to control hardware.
Moreover, Firmware
is not only software but also circuit
information using the programmable
logic device in a wide sense.
Firmware is built into a lot of things.
For example, re
mote controls, calculators, through
computer parts and devices like hard
disks, keyboards, etc.
Encryption
             The encryption is a
             notation converted to
             read with special
             knowledge,even if it is
             seen,it is not possible to
             decipher it easily.

             Encryption has three
             kinds that are called the
             code, steganography,
             and cipher.
Reference


Wikipedia
http://ja.wikipedia.org/wiki/%E3%83%A1%E3%82%A
4%E3%83%B3%E3%83%9A%E3%83%BC%E3%82
%B8

It glosarry
http://e-words.jp/

More Related Content

What's hot

A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1Ryan Mc Donagh
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYabdul talha
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Pertemuan 13 wireless security
Pertemuan 13 wireless securityPertemuan 13 wireless security
Pertemuan 13 wireless securitynewbie2019
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security ProjectsPhdtopiccom
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Network and internet security
Network and internet securityNetwork and internet security
Network and internet securityKaviya452563
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewallsSapna Kumari
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technologySaumya Ranjan Behura
 

What's hot (20)

A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
محمد
محمدمحمد
محمد
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
internet security
internet securityinternet security
internet security
 
Network security
Network securityNetwork security
Network security
 
E firewalls
E firewallsE firewalls
E firewalls
 
Firewall
FirewallFirewall
Firewall
 
Pertemuan 13 wireless security
Pertemuan 13 wireless securityPertemuan 13 wireless security
Pertemuan 13 wireless security
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
firewalls
firewallsfirewalls
firewalls
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Network and internet security
Network and internet securityNetwork and internet security
Network and internet security
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 

Viewers also liked

Teachersinactionproject ppt
Teachersinactionproject pptTeachersinactionproject ppt
Teachersinactionproject pptguestc994a8d
 
Spiritual discipleship 4
Spiritual discipleship 4Spiritual discipleship 4
Spiritual discipleship 4Renee Garber
 
Tothom hi és comptat
Tothom hi és comptatTothom hi és comptat
Tothom hi és comptata8027973
 
In search of excellence
In search of excellenceIn search of excellence
In search of excellenceSubhash Jain
 

Viewers also liked (9)

Teachersinactionproject ppt
Teachersinactionproject pptTeachersinactionproject ppt
Teachersinactionproject ppt
 
Spiritual discipleship 4
Spiritual discipleship 4Spiritual discipleship 4
Spiritual discipleship 4
 
Charla2
Charla2Charla2
Charla2
 
Sw3 6
Sw3 6Sw3 6
Sw3 6
 
Etude BrandZ 2009 : le Top 100 des marques
Etude BrandZ 2009 :  le Top 100 des marquesEtude BrandZ 2009 :  le Top 100 des marques
Etude BrandZ 2009 : le Top 100 des marques
 
Trabajo de tics
Trabajo de ticsTrabajo de tics
Trabajo de tics
 
Tothom hi és comptat
Tothom hi és comptatTothom hi és comptat
Tothom hi és comptat
 
Classement BrandZ Top 100 2015 - Millward Brown
Classement BrandZ Top 100 2015 - Millward BrownClassement BrandZ Top 100 2015 - Millward Brown
Classement BrandZ Top 100 2015 - Millward Brown
 
In search of excellence
In search of excellenceIn search of excellence
In search of excellence
 

Similar to Ga13 (20)

How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
English2
English2English2
English2
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Week13
Week13Week13
Week13
 
Network security
Network security Network security
Network security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Firewall
FirewallFirewall
Firewall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security technology
Security technologySecurity technology
Security technology
 
Firewall
FirewallFirewall
Firewall
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Week14
Week14Week14
Week14
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
Week13
Week13Week13
Week13
 
The vpn
The vpnThe vpn
The vpn
 

More from s1170143 (20)

S1170143 2
S1170143 2S1170143 2
S1170143 2
 
s1170143txt
s1170143txts1170143txt
s1170143txt
 
Sw3 week12
Sw3 week12Sw3 week12
Sw3 week12
 
Final portfolio
Final portfolioFinal portfolio
Final portfolio
 
A
AA
A
 
Peer5
Peer5Peer5
Peer5
 
Peer4
Peer4Peer4
Peer4
 
Design4
Design4Design4
Design4
 
Design3
Design3Design3
Design3
 
Design1
Design1Design1
Design1
 
Section5
Section5Section5
Section5
 
Section4
Section4Section4
Section4
 
Section3
Section3Section3
Section3
 
Section2
Section2Section2
Section2
 
Peer1
Peer1Peer1
Peer1
 
Sw
SwSw
Sw
 
Pre
PrePre
Pre
 
Sw3
Sw3Sw3
Sw3
 
Pre
PrePre
Pre
 
Sw week8
Sw week8Sw week8
Sw week8
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Ga13

  • 1. How Encryption for Strong Security Works 1; Fire wall 2; About VPN 3; About Film ware 4; Encryption s1170117 Fumiya Nagashima s1170138 Kentaro Okawa s1170139 Yoshihide Okazaki s1170143 Ryo Kawamukai
  • 2. Fire wall Fire wall is aimed software or hardware as for the control of the communication between a certain specific computer network and the outside, and the maintenance of the safety of an internal computer network.
  • 3. About VPN The service that can use a public line with VPN as if it is a dedicated line. Because data is protected and managed strictly by the attestation and the encryption, the dangers such as the leakages and tapping are low.
  • 4. About Firmware Firmware is equipment written software to control hardware. Moreover, Firmware is not only software but also circuit information using the programmable logic device in a wide sense. Firmware is built into a lot of things. For example, re mote controls, calculators, through computer parts and devices like hard disks, keyboards, etc.
  • 5. Encryption The encryption is a notation converted to read with special knowledge,even if it is seen,it is not possible to decipher it easily. Encryption has three kinds that are called the code, steganography, and cipher.