SlideShare a Scribd company logo
1 of 6
Download to read offline
How Encryption for Storing
    Security Works

Data encryption standard
File encryption
Link encryption
VPN
Data encryption
            DES is a common
            code key algorithm to
            divide data into the
            block of 64bit length,
            and to encrypt each
            block with the key to
            56 bit length.
        ●
File encryption
           File encryption is a
           secure process for
           keeping your
           sensitive and
           confidential
           information private.
           The File Encryption
           process makes the
           file unreadable
           unless or until
           decrypted.
Link encryption

Link encryption is an
approach communicaions
security that encrypts and
decrypts all traffic at each
end of a communications
line.
Virtual Private Network (VPN)
                 This is a computer
                 network in which some
                 of the links between
                 nodes are carried by
                 open connections or
                 virtual circuits in some
                 larger network instead
                 of by physical wires.
             ●
Reference
Data Encryption
http://www.atmarkit.co.jp/aig/02security/des.html
File encryption
http://searchwinit.techtarget.com/news/article/0,289142,sid
Link encryption
http://en.wikipedia.org/wiki/Link_encryption
VPN
http://en.wikipedia.org/wiki/Virtual_private_network
●

More Related Content

What's hot

Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13I M
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01Qaisar Ayub
 
Cloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewCloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewNirvanix
 
Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The CloudOmer Trajman
 
Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...SandipAryal5
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryptionPrancer Io
 
How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceSrideviM4
 
Week13 presentation
Week13 presentationWeek13 presentation
Week13 presentationgintamalove
 
Public cloud data protection
Public cloud data protectionPublic cloud data protection
Public cloud data protectionUlf Mattsson
 

What's hot (17)

Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
PGP Basic Lecture 01
PGP Basic Lecture 01PGP Basic Lecture 01
PGP Basic Lecture 01
 
Pgp
PgpPgp
Pgp
 
Cloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix OverviewCloud Storage - Nirvanix Overview
Cloud Storage - Nirvanix Overview
 
Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The Cloud
 
Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Sw2
Sw2Sw2
Sw2
 
Network Security
Network SecurityNetwork Security
Network Security
 
Covert networks
Covert networksCovert networks
Covert networks
 
R.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer scienceR.Deviga II-M.Sc computer science
R.Deviga II-M.Sc computer science
 
Week13 presentation
Week13 presentationWeek13 presentation
Week13 presentation
 
Public cloud data protection
Public cloud data protectionPublic cloud data protection
Public cloud data protection
 

Viewers also liked

עודד קאשי מצגת טבעות
עודד קאשי מצגת טבעותעודד קאשי מצגת טבעות
עודד קאשי מצגת טבעותodedkashi
 
Presentacion Itc 1 De 2009
Presentacion Itc 1 De 2009Presentacion Itc 1 De 2009
Presentacion Itc 1 De 2009German R
 
15 Ways To Grow Value
15 Ways To Grow Value15 Ways To Grow Value
15 Ways To Grow Valuegroelke
 
CMBO SIG web-to-print door Roelof Janssen
CMBO SIG web-to-print door Roelof JanssenCMBO SIG web-to-print door Roelof Janssen
CMBO SIG web-to-print door Roelof Janssencmbo
 
How Inbound Marketing Can Bring You More Customers
How Inbound Marketing Can Bring You More Customers How Inbound Marketing Can Bring You More Customers
How Inbound Marketing Can Bring You More Customers Ingenex Digital Marketing
 
@LisaAtLightFair: Social Media Marketing Case Study
@LisaAtLightFair: Social Media Marketing Case Study@LisaAtLightFair: Social Media Marketing Case Study
@LisaAtLightFair: Social Media Marketing Case StudyIngenex Digital Marketing
 
עודד קאשי מציג 2 מותגי שעונים חדשים
עודד קאשי מציג 2 מותגי שעונים חדשיםעודד קאשי מציג 2 מותגי שעונים חדשים
עודד קאשי מציג 2 מותגי שעונים חדשיםodedkashi
 
CMBO SIG over DAM/CMS
CMBO SIG over DAM/CMSCMBO SIG over DAM/CMS
CMBO SIG over DAM/CMScmbo
 
trabajos II 2009 electrotecnia
trabajos II 2009 electrotecnia trabajos II 2009 electrotecnia
trabajos II 2009 electrotecnia German R
 
Test for equal variances
Test for equal variancesTest for equal variances
Test for equal variancesJohn Smith
 
Placement T Kit
Placement T KitPlacement T Kit
Placement T Kitnvvprasad
 
Lírica galego-portuguesa: Periodización
Lírica galego-portuguesa: PeriodizaciónLírica galego-portuguesa: Periodización
Lírica galego-portuguesa: PeriodizaciónManuel Barreiro
 
Daytona 500
Daytona 500Daytona 500
Daytona 500loveluci
 
“Geointernet”: socialização e tendências da informação geográfica
“Geointernet”: socialização e tendências da informação geográfica“Geointernet”: socialização e tendências da informação geográfica
“Geointernet”: socialização e tendências da informação geográficaAngela Sanz
 

Viewers also liked (17)

עודד קאשי מצגת טבעות
עודד קאשי מצגת טבעותעודד קאשי מצגת טבעות
עודד קאשי מצגת טבעות
 
Presentacion Itc 1 De 2009
Presentacion Itc 1 De 2009Presentacion Itc 1 De 2009
Presentacion Itc 1 De 2009
 
15 Ways To Grow Value
15 Ways To Grow Value15 Ways To Grow Value
15 Ways To Grow Value
 
CMBO SIG web-to-print door Roelof Janssen
CMBO SIG web-to-print door Roelof JanssenCMBO SIG web-to-print door Roelof Janssen
CMBO SIG web-to-print door Roelof Janssen
 
How Inbound Marketing Can Bring You More Customers
How Inbound Marketing Can Bring You More Customers How Inbound Marketing Can Bring You More Customers
How Inbound Marketing Can Bring You More Customers
 
Inbound Marketing: ThinkStretch Case Study
Inbound Marketing: ThinkStretch Case StudyInbound Marketing: ThinkStretch Case Study
Inbound Marketing: ThinkStretch Case Study
 
@LisaAtLightFair: Social Media Marketing Case Study
@LisaAtLightFair: Social Media Marketing Case Study@LisaAtLightFair: Social Media Marketing Case Study
@LisaAtLightFair: Social Media Marketing Case Study
 
Inbound Marketing: Weber's Case Study
Inbound Marketing: Weber's Case StudyInbound Marketing: Weber's Case Study
Inbound Marketing: Weber's Case Study
 
עודד קאשי מציג 2 מותגי שעונים חדשים
עודד קאשי מציג 2 מותגי שעונים חדשיםעודד קאשי מציג 2 מותגי שעונים חדשים
עודד קאשי מציג 2 מותגי שעונים חדשים
 
OSRAM-OS Lightfair Case Study
OSRAM-OS Lightfair Case StudyOSRAM-OS Lightfair Case Study
OSRAM-OS Lightfair Case Study
 
CMBO SIG over DAM/CMS
CMBO SIG over DAM/CMSCMBO SIG over DAM/CMS
CMBO SIG over DAM/CMS
 
trabajos II 2009 electrotecnia
trabajos II 2009 electrotecnia trabajos II 2009 electrotecnia
trabajos II 2009 electrotecnia
 
Test for equal variances
Test for equal variancesTest for equal variances
Test for equal variances
 
Placement T Kit
Placement T KitPlacement T Kit
Placement T Kit
 
Lírica galego-portuguesa: Periodización
Lírica galego-portuguesa: PeriodizaciónLírica galego-portuguesa: Periodización
Lírica galego-portuguesa: Periodización
 
Daytona 500
Daytona 500Daytona 500
Daytona 500
 
“Geointernet”: socialização e tendências da informação geográfica
“Geointernet”: socialização e tendências da informação geográfica“Geointernet”: socialização e tendências da informação geográfica
“Geointernet”: socialização e tendências da informação geográfica
 

Similar to Week13presen

Week13
Week13Week13
Week13GroupB
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Worksguestf50fcba
 
Linux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxLinux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxBrenoMeister
 
Week13 Slides
Week13 SlidesWeek13 Slides
Week13 Slidesc001ick
 
Week13 Slides
Week13 SlidesWeek13 Slides
Week13 Slidesc001ick
 
Week13 Slides
Week13 SlidesWeek13 Slides
Week13 Slidesc001ick
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryptionAncy Mariam Babu
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20eyad alaa
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPNNaim Latifi
 

Similar to Week13presen (20)

Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Security F
Security FSecurity F
Security F
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
Linux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxLinux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsx
 
Week13 Slides
Week13 SlidesWeek13 Slides
Week13 Slides
 
Week13
Week13Week13
Week13
 
Week13 Slides
Week13 SlidesWeek13 Slides
Week13 Slides
 
Week13 Slides
Week13 SlidesWeek13 Slides
Week13 Slides
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Week13
Week13Week13
Week13
 
Cryptography and encryption
Cryptography and  encryptionCryptography and  encryption
Cryptography and encryption
 
Week13
Week13Week13
Week13
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 
Presentation VPN
Presentation VPNPresentation VPN
Presentation VPN
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Week13presen