SlideShare a Scribd company logo
1 of 5
Data Damage Countermeasures
Cipher CaesAr Cipher = FDHVU FLSKHU A=D B=E C=F
Encryption Encrypted Data Cipher Algorithm Cipher Algorithm Encrypted Senders Data Decryption tool
Public/Private Key Encryption
Data damage countermeasures

More Related Content

Viewers also liked

Análisis del libro de josué
Análisis del libro de josuéAnálisis del libro de josué
Análisis del libro de josuéestremich2
 
Presentacion de informatica.ppt2
Presentacion de informatica.ppt2Presentacion de informatica.ppt2
Presentacion de informatica.ppt2lucastra
 
05. ferramentas para a qualidade
05. ferramentas para a qualidade05. ferramentas para a qualidade
05. ferramentas para a qualidadeAlane Oliveira
 
Ia final presentation
Ia final presentationIa final presentation
Ia final presentationRAJESH KUMAR
 
Financial analysis of Reliance industries and ONGC
Financial analysis of Reliance industries and ONGCFinancial analysis of Reliance industries and ONGC
Financial analysis of Reliance industries and ONGCRAJESH KUMAR
 

Viewers also liked (9)

Análisis del libro de josué
Análisis del libro de josuéAnálisis del libro de josué
Análisis del libro de josué
 
Presentacion de informatica.ppt2
Presentacion de informatica.ppt2Presentacion de informatica.ppt2
Presentacion de informatica.ppt2
 
Unité 4 fin et révision
Unité 4 fin et révisionUnité 4 fin et révision
Unité 4 fin et révision
 
Introducing See Change
Introducing See ChangeIntroducing See Change
Introducing See Change
 
05. ferramentas para a qualidade
05. ferramentas para a qualidade05. ferramentas para a qualidade
05. ferramentas para a qualidade
 
Ia final presentation
Ia final presentationIa final presentation
Ia final presentation
 
Totem 1 dossiers 0 à 2
Totem 1 dossiers 0 à 2Totem 1 dossiers 0 à 2
Totem 1 dossiers 0 à 2
 
E1 corrigés des activités complémentaires
E1 corrigés des activités complémentairesE1 corrigés des activités complémentaires
E1 corrigés des activités complémentaires
 
Financial analysis of Reliance industries and ONGC
Financial analysis of Reliance industries and ONGCFinancial analysis of Reliance industries and ONGC
Financial analysis of Reliance industries and ONGC
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Data damage countermeasures

Editor's Notes

  1. A cipher is any method of encrypting text. Some ciphers work by simply realigning the alphabet (for example, A is represented by D, B is represented by E, C is represented by F etc.) this is called Caesar Cipher.For example, the phrase: “Caesar Cipher” would be portrayed like this.Advanced Ciphers use both a key and an algorithm. A block cipher is one that breaks a message up into blocks and combines each block with a key i.e. 64 bit data.A message longer than the block sizecan still be encrypted with a block cipher by breaking the message into blocks and encrypting each block individually.
  2. Encryption is where data is converted into an algorithm (cipher) which cannot understood by outside personnel i.e. Hackers. This is usually represented on a web browser as a padlock.How secure transactions work:The sender sends their data is an encrypted packet to the receiverThe receiver then sends an open packet back for the sender to insert their password or cipher algorithm. This open packet can then be locked by the sender but not opened as they have no access to that algorithm.The receiver receives their own packet back with the original algorithm in which they can unlock to recieve the original data!this is to prevent hackers intercepting the transaction.
  3. Key encryption is a cryptographic system that uses 2 keys.A public key can be known to everyone whereas a private key is known by only the recipient.Only Public keys are allowed to Encrypt data whereas Private Keys can only decrypt data.Public key systems are commonly used to send and receive data over the internet such as credentials at the public key system is highly safe and secure to online users.Private key systems need keys or algorithms which are as long as the sending data to ensure safe encryption.When sending and receiving data, both recipients have to know the public keys to allow them to encrypt and decrypt the data.
  4. FirewallA firewall is like a protective brick wall around your computer system which you cannot bypass, unless there are open ports. They prevent data transfer from unknown sources which my contain malicious files.Different ports in the firewall are used to allow transfers for different areas of computing e.g. Port 80 is for HTTP transfers and port 21 is for TCP.A firewalls primary objective is to limit the exposure of a computer or computer network to attack from crackers; and is commonly used on local area networks that are connected to the internet. Anti-VirusViruses can have a huge impact on organisations. A virus could unknowingly be brought into an office building by a work colleague via a pen drive and be unleashed across the network within seconds. An anti virus software can combat that and prevent the virus from spreading. A anti virus software works by having definitions, like a dictionary of known viruses, the AV will scan the device and compare it with the definitions, if there is a match then the virus is quarantined. More modern sophisticated AV products can now also run disk clean ups, defrags and backups.BackupA backup could arguably be the most important thing in information systems. Organisations should backup regularly, at least once a week. This is so that if a network or system is compromised, it is safe to wipe the system clean, as there is a copy of how the system was before which can then be simply downloaded from a web source or storage media and installed.