SlideShare a Scribd company logo
How Encryption for String Security Works ・ Encryption ・ VPN ・ WAN ・ FIREWALL
Encryption When you exchange digital data through the network, convert data so that others do not steal a glance while communicating and it is falsified according to set regulatios.
Virtual Private Network(VPN) Public circuit.. completely.. lease line as if use service. It is used for the connection of the network in the enterprise between bases etc  , and the cost is suppressed to the introduction of the lease line.
WAN Abbreviation of "Wide Area Network". ●  The line and the lease line are used. ●  The computer is connected mutually.
FIREWALL I control a particular computer network and communication with the outside, and the fire wall (a fire wall) is hardware equipped with software aimed at maintaining the security of the internal computer network or the software. I compare the cracking act that is going to invade from the outside an internal computer network to a fire and use expression called the fire wall as a thing checking it.
Reference Wikipedia http://en.wikipedia.org/ E-word http://e-words.jp/

More Related Content

What's hot

Towards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationTowards a Security-aware Network Virtualization
Towards a Security-aware Network Virtualization
Achim Friedland
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
Deepak Upadhyay
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
Real Estate
 
Algorithms for network server anomaly behavior detection without traffic cont...
Algorithms for network server anomaly behavior detection without traffic cont...Algorithms for network server anomaly behavior detection without traffic cont...
Algorithms for network server anomaly behavior detection without traffic cont...
Vladimir Eliseev
 
Network traceability
Network traceabilityNetwork traceability
Network traceability
slaprojectkn
 
12
1212
Encryption
EncryptionEncryption
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
Raj Sampat
 
Encryption
EncryptionEncryption
Encryption
Jasleen Khalsa
 
Wiretapping
WiretappingWiretapping
Wiretapping
Mr Cracker
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
Togis UAB Ltd
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
Togis UAB Ltd
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
Astha Parihar
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
Masato Nozawa
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 

What's hot (15)

Towards a Security-aware Network Virtualization
Towards a Security-aware Network VirtualizationTowards a Security-aware Network Virtualization
Towards a Security-aware Network Virtualization
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
HTTP vs HTTPS Difference
HTTP vs HTTPS Difference HTTP vs HTTPS Difference
HTTP vs HTTPS Difference
 
Algorithms for network server anomaly behavior detection without traffic cont...
Algorithms for network server anomaly behavior detection without traffic cont...Algorithms for network server anomaly behavior detection without traffic cont...
Algorithms for network server anomaly behavior detection without traffic cont...
 
Network traceability
Network traceabilityNetwork traceability
Network traceability
 
12
1212
12
 
Encryption
EncryptionEncryption
Encryption
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Encryption
EncryptionEncryption
Encryption
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
Man in-the-middle attack(http)
Man in-the-middle attack(http)Man in-the-middle attack(http)
Man in-the-middle attack(http)
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
 
How Encryption Works
How Encryption WorksHow Encryption Works
How Encryption Works
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 

Viewers also liked

Mexicanos part dos
Mexicanos part dosMexicanos part dos
Mexicanos part dos
ysabelmedina
 
Hollywood principle
Hollywood principleHollywood principle
Hollywood principle
Jun Hu
 
Mexicanos p5
Mexicanos p5Mexicanos p5
Mexicanos p5
ysabelmedina
 
How to use Social Media 4 Business (squidoo lens)
How to use Social Media 4 Business (squidoo lens)How to use Social Media 4 Business (squidoo lens)
How to use Social Media 4 Business (squidoo lens)
New Forest Business Partnership
 
The saudi oil war against russia, iran and the us
The saudi oil war against russia, iran and the usThe saudi oil war against russia, iran and the us
The saudi oil war against russia, iran and the us
Francesco Legname
 
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª EdiçãoO Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
Joel Pacheco
 
Dice02 summer school visual analytics
Dice02 summer school visual analyticsDice02 summer school visual analytics
Dice02 summer school visual analytics
Jun Hu
 
Ice ss2013
Ice ss2013Ice ss2013
Ice ss2013
Jun Hu
 
Oris ppt
Oris pptOris ppt
Oris ppt
Jun Hu
 
My space_Final
My space_FinalMy space_Final
My space_Final
Anthony Politi
 
Week14
Week14Week14
Week14
s1180079
 
Jaman Hiper-Spesialisasi
Jaman Hiper-SpesialisasiJaman Hiper-Spesialisasi
Jaman Hiper-Spesialisasi
Herman Yosef Paryono
 

Viewers also liked (12)

Mexicanos part dos
Mexicanos part dosMexicanos part dos
Mexicanos part dos
 
Hollywood principle
Hollywood principleHollywood principle
Hollywood principle
 
Mexicanos p5
Mexicanos p5Mexicanos p5
Mexicanos p5
 
How to use Social Media 4 Business (squidoo lens)
How to use Social Media 4 Business (squidoo lens)How to use Social Media 4 Business (squidoo lens)
How to use Social Media 4 Business (squidoo lens)
 
The saudi oil war against russia, iran and the us
The saudi oil war against russia, iran and the usThe saudi oil war against russia, iran and the us
The saudi oil war against russia, iran and the us
 
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª EdiçãoO Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
O Girassol - 2016 3ºtrimestre - jornal do lar - 7ª Edição
 
Dice02 summer school visual analytics
Dice02 summer school visual analyticsDice02 summer school visual analytics
Dice02 summer school visual analytics
 
Ice ss2013
Ice ss2013Ice ss2013
Ice ss2013
 
Oris ppt
Oris pptOris ppt
Oris ppt
 
My space_Final
My space_FinalMy space_Final
My space_Final
 
Week14
Week14Week14
Week14
 
Jaman Hiper-Spesialisasi
Jaman Hiper-SpesialisasiJaman Hiper-Spesialisasi
Jaman Hiper-Spesialisasi
 

Similar to Week13

Week13
Week13Week13
Week13
guestc1983
 
Week13
Week13Week13
Week13
s1180068
 
Week13
Week13Week13
Week13
s1180068
 
The vpn
The vpnThe vpn
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
adeelahmed0345
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
Anthony Daniel
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
todd521
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
IRJET Journal
 
Vpn
VpnVpn
Week13
Week13Week13
Week13
guestf0de3f
 
Week13
Week13Week13
Week13
Week13Week13
Week13
Week13Week13
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
OECLIB Odisha Electronics Control Library
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
HirazNor
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Ram Bharosh Raut
 
It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...
Centurion University of Technology and Management Odisha (Paralakhemundi)
 

Similar to Week13 (20)

Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
The vpn
The vpnThe vpn
The vpn
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Vpn
VpnVpn
Vpn
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
csevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdfcsevpnppt-170905123948 (1).pdf
csevpnppt-170905123948 (1).pdf
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...It Infrastructure Management PPT Centurion University of Technology And Manag...
It Infrastructure Management PPT Centurion University of Technology And Manag...
 

Week13

  • 1. How Encryption for String Security Works ・ Encryption ・ VPN ・ WAN ・ FIREWALL
  • 2. Encryption When you exchange digital data through the network, convert data so that others do not steal a glance while communicating and it is falsified according to set regulatios.
  • 3. Virtual Private Network(VPN) Public circuit.. completely.. lease line as if use service. It is used for the connection of the network in the enterprise between bases etc , and the cost is suppressed to the introduction of the lease line.
  • 4. WAN Abbreviation of "Wide Area Network". ● The line and the lease line are used. ● The computer is connected mutually.
  • 5. FIREWALL I control a particular computer network and communication with the outside, and the fire wall (a fire wall) is hardware equipped with software aimed at maintaining the security of the internal computer network or the software. I compare the cracking act that is going to invade from the outside an internal computer network to a fire and use expression called the fire wall as a thing checking it.