How Encryption for Strong Security Works ・ Encryption ・ VPN ・ WAN ・ FIREWALL
Encryption When you exchange digital data of the document and the image, through the network of the Internet, convert data so that it doesn't steal a glance while communicating and it is falsified by the third party according to set regulations. There is a secret key cryptosystem with the same key as the public key cryptosystem that uses two pairing keys and any though "Key" that hits the code table is used for the encryption and decoding.
Virtual Private Network(VPN) Services are available though a dedicated line as if it were a public line. Connections between locations and used for corporate networks, is introducing a lower cost than leased lines. The connection between bases becomes possible low-cost by doing "Ride together" to the backbone of the career. Because data is protected and managed strictly by the attestation and the encryption, the dangers such as interference, the leakages, and tapping are low though the data of various enterprises exists together in the backbone and it will flow.
WAN Abbreviation of "Wide Area Network". ●  The line and the lease line are used. ●  The computer is connected mutually.
FIREWALL Prevent the system by breaking into computer networks from outside the organization. Moreover, such a computer system incorporated. And corporate networks, and intrusion by third parties such as external network via the Internet, ensure that no alteration is made spying and destruction of data or programs, monitor the data flowing through the boundaries of external and fraud You need to find access blocked.
Reference E-word http://e-words.jp/

Week13

  • 1.
    How Encryption forStrong Security Works ・ Encryption ・ VPN ・ WAN ・ FIREWALL
  • 2.
    Encryption When youexchange digital data of the document and the image, through the network of the Internet, convert data so that it doesn't steal a glance while communicating and it is falsified by the third party according to set regulations. There is a secret key cryptosystem with the same key as the public key cryptosystem that uses two pairing keys and any though "Key" that hits the code table is used for the encryption and decoding.
  • 3.
    Virtual Private Network(VPN)Services are available though a dedicated line as if it were a public line. Connections between locations and used for corporate networks, is introducing a lower cost than leased lines. The connection between bases becomes possible low-cost by doing "Ride together" to the backbone of the career. Because data is protected and managed strictly by the attestation and the encryption, the dangers such as interference, the leakages, and tapping are low though the data of various enterprises exists together in the backbone and it will flow.
  • 4.
    WAN Abbreviation of"Wide Area Network". ● The line and the lease line are used. ● The computer is connected mutually.
  • 5.
    FIREWALL Prevent thesystem by breaking into computer networks from outside the organization. Moreover, such a computer system incorporated. And corporate networks, and intrusion by third parties such as external network via the Internet, ensure that no alteration is made spying and destruction of data or programs, monitor the data flowing through the boundaries of external and fraud You need to find access blocked.
  • 6.