SlideShare a Scribd company logo
How Encryption for Strong Security Works 1. Central servers 2. Router 3. Firewall 4. VPN
Central Servers File encryption protects files in central servers and mass  storage devices from being read or changed.
Router A router distributes Digital computer information that is contained within a data packet.
Firewall A firewall is a fire-  resistance rated wall assembly intended to slow the spread of fire from one side to the other, and are certification listed.
VPN A VPN is a form of link encryption often used across a private network or the Internet.
References http://en.wikipedia.org/wiki/Main_Page

More Related Content

What's hot

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
toamma
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
D Y PATIL COLLEGE OF ENGINEERING PUNE
 
Week13
Week13Week13
Week13
TuesDKK
 
voice
voicevoice
voice
chaitu64
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
HTS Hosting
 
Firewall
FirewallFirewall
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
Phdtopiccom
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
Manish Tiwari
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Ga13
Ga13Ga13
Ga13
s1170143
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1
Ryan Mc Donagh
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,Encryption
Ashwin Harikumar
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Eric Vanderburg
 
Network Security
Network SecurityNetwork Security
Network Security
Fatima Zohra BENHACINE
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 

What's hot (18)

Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
PROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY pptPROTOCOL MECHNISM FOR SECURITY ppt
PROTOCOL MECHNISM FOR SECURITY ppt
 
Week13
Week13Week13
Week13
 
voice
voicevoice
voice
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Firewall
FirewallFirewall
Firewall
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Ga13
Ga13Ga13
Ga13
 
Network security
Network securityNetwork security
Network security
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,Encryption
 
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric VanderburgInformation Security Lesson 13 - Advanced Security - Eric Vanderburg
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 

Viewers also liked

invitationfront
invitationfrontinvitationfront
invitationfront
Ashley Sheptenko
 
Effective feedback by kettie m.
Effective feedback by kettie m.Effective feedback by kettie m.
Effective feedback by kettie m.
SONNY M
 
Health Benefits of Gratitude
Health Benefits of GratitudeHealth Benefits of Gratitude
Health Benefits of Gratitude
Katie Wells
 
End of wwi & treaty of versailles
End of wwi & treaty of versaillesEnd of wwi & treaty of versailles
End of wwi & treaty of versailles
abonica
 
Hello java
Hello java  Hello java
RESUME CA UTKARSH AGRAWAL
RESUME CA UTKARSH AGRAWALRESUME CA UTKARSH AGRAWAL
RESUME CA UTKARSH AGRAWAL
Utkarsh Agrawal
 
OESIS - Blended Programs for Alternative Revenue
OESIS - Blended Programs for Alternative RevenueOESIS - Blended Programs for Alternative Revenue
OESIS - Blended Programs for Alternative Revenue
Dave Ostroff
 
SU-085 Managing Instructor Led Courses
SU-085 Managing Instructor Led CoursesSU-085 Managing Instructor Led Courses
SU-085 Managing Instructor Led Courses
Ellen C Stokes PhD(c), PHR®, SHRM-CP℠, PM, ERO, CSSGB
 
Learning english
Learning englishLearning english
Learning english
jeselen
 
Exportar datos a excel.
Exportar datos a excel.Exportar datos a excel.
Exportar datos a excel.baderj3
 
2013 advanced higher history exam
2013 advanced higher history exam2013 advanced higher history exam
2013 advanced higher history exam
mrmarr
 
Rural Mobile
Rural MobileRural Mobile
Rural Mobile
Alok Abhijit
 
Porque aprender haskell me fez um programador python melhor?
Porque aprender haskell me fez um programador python melhor?Porque aprender haskell me fez um programador python melhor?
Porque aprender haskell me fez um programador python melhor?
UFPA
 
Unit 3 Forms Of Government Types Powerpoint.Cm
Unit 3 Forms Of Government    Types Powerpoint.CmUnit 3 Forms Of Government    Types Powerpoint.Cm
Unit 3 Forms Of Government Types Powerpoint.Cm
HeatherP
 
Chapter 22 End of Empires and global south to global stage 1914- Present
Chapter 22 End of Empires and global south to global stage 1914- PresentChapter 22 End of Empires and global south to global stage 1914- Present
Chapter 22 End of Empires and global south to global stage 1914- Present
S Sandoval
 
Sec 3N Hist (Elec) Chapter 2.1 (Part 2) Reasons for rise of stalin
Sec 3N Hist (Elec) Chapter 2.1 (Part 2)  Reasons for rise of stalinSec 3N Hist (Elec) Chapter 2.1 (Part 2)  Reasons for rise of stalin
Sec 3N Hist (Elec) Chapter 2.1 (Part 2) Reasons for rise of stalin
Weng Lun Ho
 

Viewers also liked (16)

invitationfront
invitationfrontinvitationfront
invitationfront
 
Effective feedback by kettie m.
Effective feedback by kettie m.Effective feedback by kettie m.
Effective feedback by kettie m.
 
Health Benefits of Gratitude
Health Benefits of GratitudeHealth Benefits of Gratitude
Health Benefits of Gratitude
 
End of wwi & treaty of versailles
End of wwi & treaty of versaillesEnd of wwi & treaty of versailles
End of wwi & treaty of versailles
 
Hello java
Hello java  Hello java
Hello java
 
RESUME CA UTKARSH AGRAWAL
RESUME CA UTKARSH AGRAWALRESUME CA UTKARSH AGRAWAL
RESUME CA UTKARSH AGRAWAL
 
OESIS - Blended Programs for Alternative Revenue
OESIS - Blended Programs for Alternative RevenueOESIS - Blended Programs for Alternative Revenue
OESIS - Blended Programs for Alternative Revenue
 
SU-085 Managing Instructor Led Courses
SU-085 Managing Instructor Led CoursesSU-085 Managing Instructor Led Courses
SU-085 Managing Instructor Led Courses
 
Learning english
Learning englishLearning english
Learning english
 
Exportar datos a excel.
Exportar datos a excel.Exportar datos a excel.
Exportar datos a excel.
 
2013 advanced higher history exam
2013 advanced higher history exam2013 advanced higher history exam
2013 advanced higher history exam
 
Rural Mobile
Rural MobileRural Mobile
Rural Mobile
 
Porque aprender haskell me fez um programador python melhor?
Porque aprender haskell me fez um programador python melhor?Porque aprender haskell me fez um programador python melhor?
Porque aprender haskell me fez um programador python melhor?
 
Unit 3 Forms Of Government Types Powerpoint.Cm
Unit 3 Forms Of Government    Types Powerpoint.CmUnit 3 Forms Of Government    Types Powerpoint.Cm
Unit 3 Forms Of Government Types Powerpoint.Cm
 
Chapter 22 End of Empires and global south to global stage 1914- Present
Chapter 22 End of Empires and global south to global stage 1914- PresentChapter 22 End of Empires and global south to global stage 1914- Present
Chapter 22 End of Empires and global south to global stage 1914- Present
 
Sec 3N Hist (Elec) Chapter 2.1 (Part 2) Reasons for rise of stalin
Sec 3N Hist (Elec) Chapter 2.1 (Part 2)  Reasons for rise of stalinSec 3N Hist (Elec) Chapter 2.1 (Part 2)  Reasons for rise of stalin
Sec 3N Hist (Elec) Chapter 2.1 (Part 2) Reasons for rise of stalin
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Week13