SlideShare a Scribd company logo
Data Encryption :
A Powerful and an
Approachable
Technology!
Data Encryption : A Powerful and an Approachable Technology!
“
Encryption is the process of changing
information in a way as to make it
unreadable by anyone except those
possessing special knowledge that
allows them to change the information
back to its original, readable
form. Encryption is important because it
allows us to protect data that we don’t
want anyone else to have access to.
Different
methods
of Encryption:
◎Hashing:
Hashing creates a unique signature for a
message or set of data. Hashing takes data
and creates hash out of it. Each hash is
unique to the specific message so minor
change to the message would be easily
tracked.
◎Symmetric Encryption:
Symmetric encryption is also known as
private-key cryptography, and is called so
because the key used to encrypt and
decrypt the message must remain secure.
The most important thing about symmetric
encryption is that both sides—the
encrypter, and the decrypter—need access
to the same key.
◎Asymmetric methods:
It uses two keys for encryption or
decryption. With this a public key is freely
available to everyone and is used to
encrypt the message. The private key is
used by the recipient to decrypt the
message.
Benefits of
Encryption:
◎Encryption helps to
move data in to the
cloud:
Encryption can make it
possible to leverage
benefits of infrastructure
as a service while still it
ensures the privacy of
data.
◎Encryption helps to
achieve secure multi
tenancy in cloud:
In cloud environment
multi-tenancy drives
cost down and
increases flexibility. If
you encrypt data before
it enters the cloud, and
retain control of the
encryption keys, you
can ensure your data is
safe, regardless of its
neighbors.
◎Encryption prevents
service providers from
accessing private data:
If service provider has
your encrypted data and
encryption keys then
they can easily access
your data. To avoid this
problem encrypting your
data on cloud and
holding your own key is
the safest mode.
◎Encryption provides
service providers a
competitive edge:
Encryption and key
management software,
designed specifically for
virtualized
environments, can help
you significantly
improve your security
posture, attract new
customers, and expand
your business with
existing clients.
Use of
Encryption in
Modern world:
“
Now a day making mobile calls, buying
something with credit or debit cards,
shopping on the web, getting cash from
ATM machine is not possible without
encryption. So encryption is all about
transforming intelligent numbers, text,
sound or images in to a stream of
nonsense.
“
People uses encryption to securely
protect folder contents, which could
contain emails, chat histories, tax
information, credit card numbers, or any
other sensitive information. This way,
even if your computer is stolen that data
is safe.
“
So finally encryption is a powerful
technology. Once anyone knows how it
works, it is an approachable technology
as well. This technology provides
tremendous benefits to any organization
handling confidential information.
For More information
visit us on
www.esds.co.in
Thank You
SlidesCarnival icons are editable shapes.
This means that you can:
● Resize them without losing quality.
● Change line color, width and style.
Isn’t that nice? :)
Examples:

More Related Content

What's hot

Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
Prabhat Goel
 
Data encryption
Data encryptionData encryption
Data encryption
Aman Jain
 
Software for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationSoftware for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentation
Ruchika Sinha
 
Asif
AsifAsif
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
Muhammadalizardari
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
chauhankapil
 
Ss
SsSs
Cryptography
CryptographyCryptography
Cryptography
Dipti Sakpal
 

What's hot (8)

Basic concept of pki
Basic concept of pkiBasic concept of pki
Basic concept of pki
 
Data encryption
Data encryptionData encryption
Data encryption
 
Software for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationSoftware for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentation
 
Asif
AsifAsif
Asif
 
F16 cs61 cryptography
F16 cs61   cryptographyF16 cs61   cryptography
F16 cs61 cryptography
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Ss
SsSs
Ss
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Data Encryption : A Powerful and an Approachable Technology!

Sw2
Sw2Sw2
Fundamental Concept of Cryptography in Computer Security
Fundamental Concept of Cryptography in Computer SecurityFundamental Concept of Cryptography in Computer Security
Fundamental Concept of Cryptography in Computer Security
Uttara University
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
Uttara University
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
ravin349878
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
OSU - East
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
GarimaJain745610
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
Abdulafeez Fasasi
 
What is Cryptography ( cryptography )_.pdf
What is Cryptography ( cryptography )_.pdfWhat is Cryptography ( cryptography )_.pdf
What is Cryptography ( cryptography )_.pdf
Jhon Thompson
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
Anubhav Sokhal
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
IJNSA Journal
 
Week12 b
Week12 bWeek12 b
Week12 b
Takuma Abe
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Cryptography
CryptographyCryptography
Cryptography
Vedant Singh
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
Murali Krishna
 
Cryptointro
CryptointroCryptointro
Cryptointro
losalamos
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
ijtsrd
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
Prancer Io
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
Editor IJMTER
 

Similar to Data Encryption : A Powerful and an Approachable Technology! (20)

Sw2
Sw2Sw2
Sw2
 
Fundamental Concept of Cryptography in Computer Security
Fundamental Concept of Cryptography in Computer SecurityFundamental Concept of Cryptography in Computer Security
Fundamental Concept of Cryptography in Computer Security
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
encryption.pptx
encryption.pptxencryption.pptx
encryption.pptx
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
CN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptxCN GP 4 Cryptogaraphy.pptx
CN GP 4 Cryptogaraphy.pptx
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
What is Cryptography ( cryptography )_.pdf
What is Cryptography ( cryptography )_.pdfWhat is Cryptography ( cryptography )_.pdf
What is Cryptography ( cryptography )_.pdf
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
Week12 b
Week12 bWeek12 b
Week12 b
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 

More from Sai Natkar

Migration to cloud will drive the changes in wired and wireless carriers!
Migration to cloud will drive the changes in wired and wireless carriers!Migration to cloud will drive the changes in wired and wireless carriers!
Migration to cloud will drive the changes in wired and wireless carriers!
Sai Natkar
 
Big value for big data in oil and gas industry!
Big value for big data in oil and gas industry!Big value for big data in oil and gas industry!
Big value for big data in oil and gas industry!
Sai Natkar
 
Cloud Robotics: It’s time to offload their brain on Cloud, for better Robotic...
Cloud Robotics: It’s time to offload their brain on Cloud, for better Robotic...Cloud Robotics: It’s time to offload their brain on Cloud, for better Robotic...
Cloud Robotics: It’s time to offload their brain on Cloud, for better Robotic...
Sai Natkar
 
The ultimate banking and financial sector with cloud computing machine !
The ultimate banking and financial sector with cloud computing machine ! The ultimate banking and financial sector with cloud computing machine !
The ultimate banking and financial sector with cloud computing machine !
Sai Natkar
 
Mobile Cloud Computing : The Upcoming Trend !
Mobile Cloud Computing : The Upcoming Trend !Mobile Cloud Computing : The Upcoming Trend !
Mobile Cloud Computing : The Upcoming Trend !
Sai Natkar
 
Energy sector is getting fueled on Digital Tech!
Energy sector is getting fueled on Digital Tech!Energy sector is getting fueled on Digital Tech!
Energy sector is getting fueled on Digital Tech!
Sai Natkar
 
Say Cheese! Cherish your memories which are safe in Cloud Album!
Say Cheese! Cherish your memories which are safe in Cloud Album! Say Cheese! Cherish your memories which are safe in Cloud Album!
Say Cheese! Cherish your memories which are safe in Cloud Album!
Sai Natkar
 
Game as a Service (GaaS) : Anytime, Anywhere!
Game as a Service (GaaS) : Anytime, Anywhere!Game as a Service (GaaS) : Anytime, Anywhere!
Game as a Service (GaaS) : Anytime, Anywhere!
Sai Natkar
 
Consumer goods are moving fast to the cloud!
Consumer goods are moving fast to the cloud!Consumer goods are moving fast to the cloud!
Consumer goods are moving fast to the cloud!
Sai Natkar
 
The cloud climate perfect for flourishing an e commerce industry !
The cloud climate  perfect for flourishing an e commerce industry !The cloud climate  perfect for flourishing an e commerce industry !
The cloud climate perfect for flourishing an e commerce industry !
Sai Natkar
 
Cyber Crime : Statistics & Trends
Cyber Crime : Statistics & TrendsCyber Crime : Statistics & Trends
Cyber Crime : Statistics & Trends
Sai Natkar
 
Cloud Computing : The game changer in Media and Entertainment Industry
Cloud Computing : The game changer in Media and Entertainment Industry Cloud Computing : The game changer in Media and Entertainment Industry
Cloud Computing : The game changer in Media and Entertainment Industry
Sai Natkar
 
Travel with the cloud!
Travel with the cloud!Travel with the cloud!
Travel with the cloud!
Sai Natkar
 
Online marriage business marries with cloud computing for uninterrupted match...
Online marriage business marries with cloud computing for uninterrupted match...Online marriage business marries with cloud computing for uninterrupted match...
Online marriage business marries with cloud computing for uninterrupted match...
Sai Natkar
 

More from Sai Natkar (14)

Migration to cloud will drive the changes in wired and wireless carriers!
Migration to cloud will drive the changes in wired and wireless carriers!Migration to cloud will drive the changes in wired and wireless carriers!
Migration to cloud will drive the changes in wired and wireless carriers!
 
Big value for big data in oil and gas industry!
Big value for big data in oil and gas industry!Big value for big data in oil and gas industry!
Big value for big data in oil and gas industry!
 
Cloud Robotics: It’s time to offload their brain on Cloud, for better Robotic...
Cloud Robotics: It’s time to offload their brain on Cloud, for better Robotic...Cloud Robotics: It’s time to offload their brain on Cloud, for better Robotic...
Cloud Robotics: It’s time to offload their brain on Cloud, for better Robotic...
 
The ultimate banking and financial sector with cloud computing machine !
The ultimate banking and financial sector with cloud computing machine ! The ultimate banking and financial sector with cloud computing machine !
The ultimate banking and financial sector with cloud computing machine !
 
Mobile Cloud Computing : The Upcoming Trend !
Mobile Cloud Computing : The Upcoming Trend !Mobile Cloud Computing : The Upcoming Trend !
Mobile Cloud Computing : The Upcoming Trend !
 
Energy sector is getting fueled on Digital Tech!
Energy sector is getting fueled on Digital Tech!Energy sector is getting fueled on Digital Tech!
Energy sector is getting fueled on Digital Tech!
 
Say Cheese! Cherish your memories which are safe in Cloud Album!
Say Cheese! Cherish your memories which are safe in Cloud Album! Say Cheese! Cherish your memories which are safe in Cloud Album!
Say Cheese! Cherish your memories which are safe in Cloud Album!
 
Game as a Service (GaaS) : Anytime, Anywhere!
Game as a Service (GaaS) : Anytime, Anywhere!Game as a Service (GaaS) : Anytime, Anywhere!
Game as a Service (GaaS) : Anytime, Anywhere!
 
Consumer goods are moving fast to the cloud!
Consumer goods are moving fast to the cloud!Consumer goods are moving fast to the cloud!
Consumer goods are moving fast to the cloud!
 
The cloud climate perfect for flourishing an e commerce industry !
The cloud climate  perfect for flourishing an e commerce industry !The cloud climate  perfect for flourishing an e commerce industry !
The cloud climate perfect for flourishing an e commerce industry !
 
Cyber Crime : Statistics & Trends
Cyber Crime : Statistics & TrendsCyber Crime : Statistics & Trends
Cyber Crime : Statistics & Trends
 
Cloud Computing : The game changer in Media and Entertainment Industry
Cloud Computing : The game changer in Media and Entertainment Industry Cloud Computing : The game changer in Media and Entertainment Industry
Cloud Computing : The game changer in Media and Entertainment Industry
 
Travel with the cloud!
Travel with the cloud!Travel with the cloud!
Travel with the cloud!
 
Online marriage business marries with cloud computing for uninterrupted match...
Online marriage business marries with cloud computing for uninterrupted match...Online marriage business marries with cloud computing for uninterrupted match...
Online marriage business marries with cloud computing for uninterrupted match...
 

Recently uploaded

Harendra Singh, AI Strategy and Consulting Portfolio
Harendra Singh, AI Strategy and Consulting PortfolioHarendra Singh, AI Strategy and Consulting Portfolio
Harendra Singh, AI Strategy and Consulting Portfolio
harendmgr
 
🚂🚘 Premium Girls Call Bangalore 🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
🚂🚘 Premium Girls Call Bangalore  🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...🚂🚘 Premium Girls Call Bangalore  🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
🚂🚘 Premium Girls Call Bangalore 🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
bhupeshkumar0889
 
History and Application of LLM Leveraging Big Data
History and Application of LLM Leveraging Big DataHistory and Application of LLM Leveraging Big Data
History and Application of LLM Leveraging Big Data
Jongwook Woo
 
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
ginni singh$A17
 
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
revolutionary575
 
CHAPTER-1-Introduction-to-Marketing.pptx
CHAPTER-1-Introduction-to-Marketing.pptxCHAPTER-1-Introduction-to-Marketing.pptx
CHAPTER-1-Introduction-to-Marketing.pptx
girewiy968
 
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
birajmohan012
 
Research proposal seminar ,Research Methodology
Research proposal seminar ,Research MethodologyResearch proposal seminar ,Research Methodology
Research proposal seminar ,Research Methodology
doctorzlife786
 
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
tanupasswan6
 
Premium Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Premium Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Premium Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Premium Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
6459astrid
 
the potential of the development of the Ford–Fulkerson algorithm to solve the...
the potential of the development of the Ford–Fulkerson algorithm to solve the...the potential of the development of the Ford–Fulkerson algorithm to solve the...
the potential of the development of the Ford–Fulkerson algorithm to solve the...
huseindihon
 
Potential Uses of the Floyd-Warshall Algorithm as appropriate
Potential Uses of the Floyd-Warshall Algorithm as appropriatePotential Uses of the Floyd-Warshall Algorithm as appropriate
Potential Uses of the Floyd-Warshall Algorithm as appropriate
huseindihon
 
Exclusive Girls Call Noida 🎈🔥9873940964 🔥💋🎈 Provide Best And Top Girl Service...
Exclusive Girls Call Noida 🎈🔥9873940964 🔥💋🎈 Provide Best And Top Girl Service...Exclusive Girls Call Noida 🎈🔥9873940964 🔥💋🎈 Provide Best And Top Girl Service...
Exclusive Girls Call Noida 🎈🔥9873940964 🔥💋🎈 Provide Best And Top Girl Service...
sheetal singh$A17
 
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
kinni singh$A17
 
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
fatima shekh$A17
 
DataScienceConcept_Kanchana_Weerasinghe.pptx
DataScienceConcept_Kanchana_Weerasinghe.pptxDataScienceConcept_Kanchana_Weerasinghe.pptx
DataScienceConcept_Kanchana_Weerasinghe.pptx
Kanchana Weerasinghe
 
Why_are_we_hypnotizing_ourselves-_ATeggin-1.pdf
Why_are_we_hypnotizing_ourselves-_ATeggin-1.pdfWhy_are_we_hypnotizing_ourselves-_ATeggin-1.pdf
Why_are_we_hypnotizing_ourselves-_ATeggin-1.pdf
Alexander Teggin
 
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
gargnatasha985
 
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
saadkhan1485265
 
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
kuldeepsharmaks8120
 

Recently uploaded (20)

Harendra Singh, AI Strategy and Consulting Portfolio
Harendra Singh, AI Strategy and Consulting PortfolioHarendra Singh, AI Strategy and Consulting Portfolio
Harendra Singh, AI Strategy and Consulting Portfolio
 
🚂🚘 Premium Girls Call Bangalore 🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
🚂🚘 Premium Girls Call Bangalore  🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...🚂🚘 Premium Girls Call Bangalore  🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
🚂🚘 Premium Girls Call Bangalore 🛵🚡000XX00000 💃 Choose Best And Top Girl Serv...
 
History and Application of LLM Leveraging Big Data
History and Application of LLM Leveraging Big DataHistory and Application of LLM Leveraging Big Data
History and Application of LLM Leveraging Big Data
 
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
Celebrity Girls Call Noida 9873940964 Unlimited Short Providing Girls Service...
 
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
Celebrity Girls Call Andheri 9930245274 Unlimited Short Providing Girls Servi...
 
CHAPTER-1-Introduction-to-Marketing.pptx
CHAPTER-1-Introduction-to-Marketing.pptxCHAPTER-1-Introduction-to-Marketing.pptx
CHAPTER-1-Introduction-to-Marketing.pptx
 
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
Beautiful Girls Call Pune 000XX00000 Provide Best And Top Girl Service And No...
 
Research proposal seminar ,Research Methodology
Research proposal seminar ,Research MethodologyResearch proposal seminar ,Research Methodology
Research proposal seminar ,Research Methodology
 
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
New Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And N...
 
Premium Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Premium Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Premium Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Premium Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
 
the potential of the development of the Ford–Fulkerson algorithm to solve the...
the potential of the development of the Ford–Fulkerson algorithm to solve the...the potential of the development of the Ford–Fulkerson algorithm to solve the...
the potential of the development of the Ford–Fulkerson algorithm to solve the...
 
Potential Uses of the Floyd-Warshall Algorithm as appropriate
Potential Uses of the Floyd-Warshall Algorithm as appropriatePotential Uses of the Floyd-Warshall Algorithm as appropriate
Potential Uses of the Floyd-Warshall Algorithm as appropriate
 
Exclusive Girls Call Noida 🎈🔥9873940964 🔥💋🎈 Provide Best And Top Girl Service...
Exclusive Girls Call Noida 🎈🔥9873940964 🔥💋🎈 Provide Best And Top Girl Service...Exclusive Girls Call Noida 🎈🔥9873940964 🔥💋🎈 Provide Best And Top Girl Service...
Exclusive Girls Call Noida 🎈🔥9873940964 🔥💋🎈 Provide Best And Top Girl Service...
 
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
Noida Girls Call Noida 9873940964 Unlimited Short Providing Girls Service Ava...
 
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
BDSM Girls Call Delhi 🎈🔥9711199171 🔥💋🎈 Provide Best And Top Girl Service And ...
 
DataScienceConcept_Kanchana_Weerasinghe.pptx
DataScienceConcept_Kanchana_Weerasinghe.pptxDataScienceConcept_Kanchana_Weerasinghe.pptx
DataScienceConcept_Kanchana_Weerasinghe.pptx
 
Why_are_we_hypnotizing_ourselves-_ATeggin-1.pdf
Why_are_we_hypnotizing_ourselves-_ATeggin-1.pdfWhy_are_we_hypnotizing_ourselves-_ATeggin-1.pdf
Why_are_we_hypnotizing_ourselves-_ATeggin-1.pdf
 
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in CityGirls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
Girls Call Vadodara 000XX00000 Provide Best And Top Girl Service And No1 in City
 
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
High Girls Call Nagpur 000XX00000 Provide Best And Top Girl Service And No1 i...
 
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...🚂🚘 Premium Girls Call Nashik  🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
🚂🚘 Premium Girls Call Nashik 🛵🚡000XX00000 💃 Choose Best And Top Girl Service...
 

Data Encryption : A Powerful and an Approachable Technology!

  • 1. Data Encryption : A Powerful and an Approachable Technology!
  • 3. “ Encryption is the process of changing information in a way as to make it unreadable by anyone except those possessing special knowledge that allows them to change the information back to its original, readable form. Encryption is important because it allows us to protect data that we don’t want anyone else to have access to.
  • 5. ◎Hashing: Hashing creates a unique signature for a message or set of data. Hashing takes data and creates hash out of it. Each hash is unique to the specific message so minor change to the message would be easily tracked.
  • 6. ◎Symmetric Encryption: Symmetric encryption is also known as private-key cryptography, and is called so because the key used to encrypt and decrypt the message must remain secure. The most important thing about symmetric encryption is that both sides—the encrypter, and the decrypter—need access to the same key.
  • 7. ◎Asymmetric methods: It uses two keys for encryption or decryption. With this a public key is freely available to everyone and is used to encrypt the message. The private key is used by the recipient to decrypt the message.
  • 9. ◎Encryption helps to move data in to the cloud: Encryption can make it possible to leverage benefits of infrastructure as a service while still it ensures the privacy of data. ◎Encryption helps to achieve secure multi tenancy in cloud: In cloud environment multi-tenancy drives cost down and increases flexibility. If you encrypt data before it enters the cloud, and retain control of the encryption keys, you can ensure your data is safe, regardless of its neighbors.
  • 10. ◎Encryption prevents service providers from accessing private data: If service provider has your encrypted data and encryption keys then they can easily access your data. To avoid this problem encrypting your data on cloud and holding your own key is the safest mode. ◎Encryption provides service providers a competitive edge: Encryption and key management software, designed specifically for virtualized environments, can help you significantly improve your security posture, attract new customers, and expand your business with existing clients.
  • 12. “ Now a day making mobile calls, buying something with credit or debit cards, shopping on the web, getting cash from ATM machine is not possible without encryption. So encryption is all about transforming intelligent numbers, text, sound or images in to a stream of nonsense.
  • 13. “ People uses encryption to securely protect folder contents, which could contain emails, chat histories, tax information, credit card numbers, or any other sensitive information. This way, even if your computer is stolen that data is safe.
  • 14. “ So finally encryption is a powerful technology. Once anyone knows how it works, it is an approachable technology as well. This technology provides tremendous benefits to any organization handling confidential information.
  • 15. For More information visit us on www.esds.co.in Thank You
  • 16. SlidesCarnival icons are editable shapes. This means that you can: ● Resize them without losing quality. ● Change line color, width and style. Isn’t that nice? :) Examples: