SlideShare a Scribd company logo
How Encryption for
Strong Security Works

・Encryption
・firmware
・TCP/IP
・VPN
Encryption
When we use the Internet, we're not always just
clicking around and passively taking in information,
such as reading news articles or blog posts -- a great
deal of our time online involves sending others our
own information. Ordering something over the
Internet, whether it's a book, a CD or anything else
from an online vendor, or signing up for an online
account, requires entering in a good deal of sensitive
personal information. A typical transaction might
include not only our names, e-mail addresses and
physical address and phone number, but also
passwords and personal identification numbers
(PINs).
firmware
Firmware refers to read-only memory (ROM) chips
that store permanent instructions. Firmware boots
up computerized or digital devices, as ROM chips
are non-volatile, meaning they do not require a
power source to hold their contents. This
differentiates firmware from random access
memory (RAM), for example, which loses stored
data at shutdown. Perhaps the most familiar
firmware is the basic input output system (BIOS)
chip. The BIOS chip on a computer motherboard
holds instructions that, upon powering up, initialize
the hardware, ensure components are working,
and finally roll out the operating system to take
over.
TPC/IP
TCP/IP (Transmission Control Protocol/Internet
Protocol) is the basic communication language or
protocol of the Internet. It can also be used as a
communications protocol in a private network
(either an intranet or an extranet). When you are
set up with direct access to the Internet, your
computer is provided with a copy of the TCP/IP
program just as every other computer that you may
send messages to or get information from also has
a copy of TCP/IP.
VPN
TCP/IP (Transmission Control Protocol/Internet
Protocol) is the basic communication language or
protocol of the Internet. It can also be used as a
communications protocol in a private network
(either an intranet or an extranet). When you are set
up with direct access to the Internet, your computer
is provided with a copy of the TCP/IP program just
as every other computer that you may send
messages to or get information from also has a
copy of TCP/IP.
Reference
・How stuff works
http://www.howstuffworks.com/encryption.htm/printable

・wisegeek
http://www.wisegeek.com/what-is-firmware.htm

・Search network.com
http://searchnetworking.techtarget.com/definition/TCP-IP

・About.com
http://compnetworking.about.com/od/vpn/a/what_is_a_vpn.htm

More Related Content

Viewers also liked

Privat och offentligt miljö i en kontorsbyggnad
Privat och offentligt miljö i en kontorsbyggnadPrivat och offentligt miljö i en kontorsbyggnad
Privat och offentligt miljö i en kontorsbyggnad
Галина/Galina Лалова/Lalova
 
Schnee in dakota
Schnee in dakotaSchnee in dakota
Schnee in dakota
dimgaloutzis1
 
Ta en tydelig posisjon med godt innhold. Metro Branding
Ta en tydelig posisjon med godt innhold. Metro BrandingTa en tydelig posisjon med godt innhold. Metro Branding
Ta en tydelig posisjon med godt innhold. Metro Branding
Christian Omvik
 
Slideshare
SlideshareSlideshare
Slideshare
freddy abril
 
Raluca kisescu avon
Raluca kisescu avonRaluca kisescu avon
Raluca kisescu avon
RevistaBiz
 
NOMINA
NOMINANOMINA
Paul olteanu inovolt
Paul olteanu inovoltPaul olteanu inovolt
Paul olteanu inovolt
RevistaBiz
 
report design
report designreport design
report designterkomany
 
Rotary club Geldermalsen 60 jaar
Rotary club Geldermalsen 60 jaarRotary club Geldermalsen 60 jaar
Rotary club Geldermalsen 60 jaar
Spijker & Co
 
Ley 1581 base de datos
Ley 1581 base de datosLey 1581 base de datos
Ley 1581 base de datos
julan gonzalez
 
Netzwerkworkshop
NetzwerkworkshopNetzwerkworkshop
Netzwerkworkshop
guestb043a4fc
 
GRAFICA DE LA DEMANDA Y OFERTA
GRAFICA DE LA DEMANDA Y OFERTAGRAFICA DE LA DEMANDA Y OFERTA
GRAFICA DE LA DEMANDA Y OFERTA
julan gonzalez
 
Egil Sundheim, direktør for markedsinformasjon i EFF - Har prisfallet ført ti...
Egil Sundheim, direktør for markedsinformasjon i EFF - Har prisfallet ført ti...Egil Sundheim, direktør for markedsinformasjon i EFF - Har prisfallet ført ti...
Egil Sundheim, direktør for markedsinformasjon i EFF - Har prisfallet ført ti...
Norwegian Seafood Council
 
Lego ninjago spinners
Lego ninjago spinnersLego ninjago spinners
Lego ninjago spinners
babyshowerideas
 
Mobile+API
Mobile+APIMobile+API
Mobile+API
Miguel Paraz
 
Powerpoint sentrumskonferansen
Powerpoint sentrumskonferansenPowerpoint sentrumskonferansen
Powerpoint sentrumskonferansenNorsk_Form
 
Plans and elevations from whiteboard maths
Plans and elevations from whiteboard mathsPlans and elevations from whiteboard maths
Plans and elevations from whiteboard mathsmrhoad
 

Viewers also liked (20)

Privat och offentligt miljö i en kontorsbyggnad
Privat och offentligt miljö i en kontorsbyggnadPrivat och offentligt miljö i en kontorsbyggnad
Privat och offentligt miljö i en kontorsbyggnad
 
April uprising (1) (1)
April uprising (1) (1)April uprising (1) (1)
April uprising (1) (1)
 
Schnee in dakota
Schnee in dakotaSchnee in dakota
Schnee in dakota
 
Ta en tydelig posisjon med godt innhold. Metro Branding
Ta en tydelig posisjon med godt innhold. Metro BrandingTa en tydelig posisjon med godt innhold. Metro Branding
Ta en tydelig posisjon med godt innhold. Metro Branding
 
Slideshare
SlideshareSlideshare
Slideshare
 
Raluca kisescu avon
Raluca kisescu avonRaluca kisescu avon
Raluca kisescu avon
 
NOMINA
NOMINANOMINA
NOMINA
 
Paul olteanu inovolt
Paul olteanu inovoltPaul olteanu inovolt
Paul olteanu inovolt
 
report design
report designreport design
report design
 
Neurosustentabilidade
NeurosustentabilidadeNeurosustentabilidade
Neurosustentabilidade
 
Rotary club Geldermalsen 60 jaar
Rotary club Geldermalsen 60 jaarRotary club Geldermalsen 60 jaar
Rotary club Geldermalsen 60 jaar
 
Ley 1581 base de datos
Ley 1581 base de datosLey 1581 base de datos
Ley 1581 base de datos
 
Emprendimiento
EmprendimientoEmprendimiento
Emprendimiento
 
Netzwerkworkshop
NetzwerkworkshopNetzwerkworkshop
Netzwerkworkshop
 
GRAFICA DE LA DEMANDA Y OFERTA
GRAFICA DE LA DEMANDA Y OFERTAGRAFICA DE LA DEMANDA Y OFERTA
GRAFICA DE LA DEMANDA Y OFERTA
 
Egil Sundheim, direktør for markedsinformasjon i EFF - Har prisfallet ført ti...
Egil Sundheim, direktør for markedsinformasjon i EFF - Har prisfallet ført ti...Egil Sundheim, direktør for markedsinformasjon i EFF - Har prisfallet ført ti...
Egil Sundheim, direktør for markedsinformasjon i EFF - Har prisfallet ført ti...
 
Lego ninjago spinners
Lego ninjago spinnersLego ninjago spinners
Lego ninjago spinners
 
Mobile+API
Mobile+APIMobile+API
Mobile+API
 
Powerpoint sentrumskonferansen
Powerpoint sentrumskonferansenPowerpoint sentrumskonferansen
Powerpoint sentrumskonferansen
 
Plans and elevations from whiteboard maths
Plans and elevations from whiteboard mathsPlans and elevations from whiteboard maths
Plans and elevations from whiteboard maths
 

Similar to Week13

Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
Mohit Dhankher
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
sonuagain
 
Ist264 sowards h_chapter6labjournal
Ist264 sowards h_chapter6labjournalIst264 sowards h_chapter6labjournal
Ist264 sowards h_chapter6labjournal
Harold Sowards
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
ManishKumarH
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
Ramesh S P Ramesh
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
SamyakJain710491
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
nitashach22
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
YonasBayu1
 
internet protocol
internet protocolinternet protocol
internet protocol
rajshreemuthiah
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
Saman M. Almufti
 
smoothwall networkguide
smoothwall networkguidesmoothwall networkguide
smoothwall networkguide
stone55
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Routers Firewalls And Proxies - OH MY!
Routers Firewalls And Proxies - OH MY!Routers Firewalls And Proxies - OH MY!
Routers Firewalls And Proxies - OH MY!
Jon Spriggs
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocolsPriyanka Shinde
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
csukxnr
 

Similar to Week13 (20)

Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Network and security concepts
Network and security conceptsNetwork and security concepts
Network and security concepts
 
Ist264 sowards h_chapter6labjournal
Ist264 sowards h_chapter6labjournalIst264 sowards h_chapter6labjournal
Ist264 sowards h_chapter6labjournal
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
Internet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptxInternet Protocol(Samyak Jain 25014).pptx
Internet Protocol(Samyak Jain 25014).pptx
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Lecture 2- terminology
Lecture  2- terminologyLecture  2- terminology
Lecture 2- terminology
 
smoothwall networkguide
smoothwall networkguidesmoothwall networkguide
smoothwall networkguide
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
H n q & a
H n q & aH n q & a
H n q & a
 
Routers Firewalls And Proxies - OH MY!
Routers Firewalls And Proxies - OH MY!Routers Firewalls And Proxies - OH MY!
Routers Firewalls And Proxies - OH MY!
 
Firewall
FirewallFirewall
Firewall
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Ip
IpIp
Ip
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 

More from s1180110

More from s1180110 (8)

Week10 3
Week10 3Week10 3
Week10 3
 
Week10 2
Week10 2Week10 2
Week10 2
 
Week10
Week10Week10
Week10
 
Sl 3
Sl 3Sl 3
Sl 3
 
Sl 3
Sl 3Sl 3
Sl 3
 
Sl 2
Sl 2Sl 2
Sl 2
 
Sl 1
Sl 1Sl 1
Sl 1
 
Week6
Week6Week6
Week6
 

Week13

  • 1. How Encryption for Strong Security Works ・Encryption ・firmware ・TCP/IP ・VPN
  • 2. Encryption When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs).
  • 3. firmware Firmware refers to read-only memory (ROM) chips that store permanent instructions. Firmware boots up computerized or digital devices, as ROM chips are non-volatile, meaning they do not require a power source to hold their contents. This differentiates firmware from random access memory (RAM), for example, which loses stored data at shutdown. Perhaps the most familiar firmware is the basic input output system (BIOS) chip. The BIOS chip on a computer motherboard holds instructions that, upon powering up, initialize the hardware, ensure components are working, and finally roll out the operating system to take over.
  • 4. TPC/IP TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
  • 5. VPN TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or an extranet). When you are set up with direct access to the Internet, your computer is provided with a copy of the TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
  • 6. Reference ・How stuff works http://www.howstuffworks.com/encryption.htm/printable ・wisegeek http://www.wisegeek.com/what-is-firmware.htm ・Search network.com http://searchnetworking.techtarget.com/definition/TCP-IP ・About.com http://compnetworking.about.com/od/vpn/a/what_is_a_vpn.htm