SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption for Strong Security
             Works
●
    Central servers

●
    TCP/ICP and Ethernet

●
    An encryption key

●
    References
Central servers
●   The Central Server, commonly referred to as
    Central, provides local area networking
    services.

●   It consists of a set of high-speed computers
    that stores office applications and data files
    shared by many different people.

●   7 by 24 by 365 coverage

●   Uninterrupted Power Supply (UPS)
TCP/ICP and Ethernet
●
    It intersects in TCP/IP and the Ethernet packet
    non-encrypted from which PC is encrypted and
    the network has intersected as for enclosed
    data.
●
    The router can use the
    encryption between us to
     protect the entire
    stream of data.
●
    This is called a link
    encryption. The local file
    encryption protects data from a physical
    invasion.
An Encryption key Part1
●
    An encryption key plays a important role in
    Internet communication because we need this
    key for reading the important data processed
    data encryption.

●
    The data that has important information is
    buried in the pseudorandom noise
    by an encryption program. This precess is
    called data encryption.

●
    So, someone else cannot see it without the
    encryption key.
An Encryption key Part2
●
    The receiver has to
    have the sender's
    encryption key to
    read the sent data.

●
    So, the sender has to
    give the receiver this
    key in safe way.
References
●   Wikipedia
     http://www.wikipedia.org/

●   e-words
     http://e-words.jp/

More Related Content

Viewers also liked

Viewers also liked (16)

Partes del pc
Partes del pcPartes del pc
Partes del pc
 
Homchick Project 1
Homchick Project 1Homchick Project 1
Homchick Project 1
 
Laat de zon schijnen
Laat de zon schijnenLaat de zon schijnen
Laat de zon schijnen
 
Partes del pc
Partes del pcPartes del pc
Partes del pc
 
ZMAZZ zoekt ijsbrekers!
ZMAZZ zoekt ijsbrekers!ZMAZZ zoekt ijsbrekers!
ZMAZZ zoekt ijsbrekers!
 
Video Workshop - Surgical Management - Advance Ovarian Cancer
Video Workshop - Surgical Management - Advance Ovarian CancerVideo Workshop - Surgical Management - Advance Ovarian Cancer
Video Workshop - Surgical Management - Advance Ovarian Cancer
 
ZMAZZ Parkeren instructies
ZMAZZ Parkeren instructiesZMAZZ Parkeren instructies
ZMAZZ Parkeren instructies
 
ZMAZZ core values
ZMAZZ core valuesZMAZZ core values
ZMAZZ core values
 
Comm 2 presentation
Comm 2 presentationComm 2 presentation
Comm 2 presentation
 
Partes del pc
Partes del pcPartes del pc
Partes del pc
 
Media presentation
Media presentationMedia presentation
Media presentation
 
ZMAZZ Vision
ZMAZZ VisionZMAZZ Vision
ZMAZZ Vision
 
Partes del pc
Partes del pcPartes del pc
Partes del pc
 
Ethics - Marketing to Children
Ethics  - Marketing to ChildrenEthics  - Marketing to Children
Ethics - Marketing to Children
 
The radiation effects to health
The radiation effects to health The radiation effects to health
The radiation effects to health
 
Law of the sea
Law of the seaLaw of the sea
Law of the sea
 

Similar to Homework4

How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Worksguestf50fcba
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
Homomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themHomomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themMuhammedYaseen39
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdfssusera1b6c7
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptxkarthikvcyber
 

Similar to Homework4 (20)

Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Security F
Security FSecurity F
Security F
 
Eng12
Eng12Eng12
Eng12
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Sw2 b12
Sw2 b12Sw2 b12
Sw2 b12
 
Homomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themHomomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing them
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Group3
Group3Group3
Group3
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 

More from noblesseoblige6 (10)

Chile's earthquake in 2010
Chile's earthquake in 2010Chile's earthquake in 2010
Chile's earthquake in 2010
 
Tsunami warnig organizations
Tsunami warnig organizationsTsunami warnig organizations
Tsunami warnig organizations
 
Radiation effects
Radiation effectsRadiation effects
Radiation effects
 
Gradeassignment11 a1
Gradeassignment11 a1Gradeassignment11 a1
Gradeassignment11 a1
 
GradeAssignment6B
GradeAssignment6BGradeAssignment6B
GradeAssignment6B
 
GradeAssignment6B
GradeAssignment6BGradeAssignment6B
GradeAssignment6B
 
Homework5
Homework5Homework5
Homework5
 
Homework3
Homework3Homework3
Homework3
 
Homework2
Homework2Homework2
Homework2
 
Homework1
Homework1Homework1
Homework1
 

Homework4

  • 1. How Encryption for Strong Security Works ● Central servers ● TCP/ICP and Ethernet ● An encryption key ● References
  • 2. Central servers ● The Central Server, commonly referred to as Central, provides local area networking services. ● It consists of a set of high-speed computers that stores office applications and data files shared by many different people. ● 7 by 24 by 365 coverage ● Uninterrupted Power Supply (UPS)
  • 3. TCP/ICP and Ethernet ● It intersects in TCP/IP and the Ethernet packet non-encrypted from which PC is encrypted and the network has intersected as for enclosed data. ● The router can use the encryption between us to protect the entire stream of data. ● This is called a link encryption. The local file encryption protects data from a physical invasion.
  • 4. An Encryption key Part1 ● An encryption key plays a important role in Internet communication because we need this key for reading the important data processed data encryption. ● The data that has important information is buried in the pseudorandom noise by an encryption program. This precess is called data encryption. ● So, someone else cannot see it without the encryption key.
  • 5. An Encryption key Part2 ● The receiver has to have the sender's encryption key to read the sent data. ● So, the sender has to give the receiver this key in safe way.
  • 6. References ● Wikipedia http://www.wikipedia.org/ ● e-words http://e-words.jp/