Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Encryption presentation final

31 284 vues

Publié le

Publié dans : Technologie
  • If you need your papers to be written and if you are not that kind of person who likes to do researches and analyze something - you should definitely contact these guys! They are awesome ⇒⇒⇒WRITE-MY-PAPER.net ⇐⇐⇐
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • www.HelpWriting.net is a really good site. thanks
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • I also like the www.HelpWriting.net site. They helped me
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • My struggles with my dissertation were long gone since the day I contacted Emily for my dissertation help. Great assistance by guys from ⇒⇒⇒WRITE-MY-PAPER.net ⇐⇐⇐
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Writing good research paper is quite easy and very difficult simultaneously. It depends on the individual skill set also. You can get help from research paper writing. Check out, please ⇒ www.HelpWriting.net ⇐
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici

Encryption presentation final

  1. 1. Encryption By: Melissa Wong and Adrianna Djie
  2. 2. Table of Contents <ul>We will be talking about... <li>What is Encryption?
  3. 3. Why Do We Use Encryption?
  4. 4. How Does It Work? (x3)
  5. 5. Pros and Cons
  6. 6. Real Life Examples </li></ul>
  7. 7. What is Encryption? <ul><li>Encryption: The process of coding text
  8. 8. Decryption: The process of decoding text </li><ul><li>Decryption is the opposite of encryption </li></ul><li>A security method used to protect data </li><ul><li>Files on computers
  9. 9. Data being passed through the Internet </li><ul><li>ATM machines
  10. 10. E-Commerce
  11. 11. Facebook password </li></ul></ul></ul>
  12. 12. Why Do We Use Encryption? <ul><li>To secure important information e.g. : </li><ul><li>Health records
  13. 13. Credit card information
  14. 14. Student records
  15. 15. Etc. </li></ul><li>Prevents information from getting stolen or read
  16. 16. Without encryption, there is no reliable security </li></ul>
  17. 17. How Does It Work? <ul><li>Encryption allows the sender to transform data from plain text into ciphertext by using a key </li><ul><li>Ciphertext: coded text
  18. 18. Key: what is used to encrypt and decrypt text </li></ul><li>Two different types of encryption: </li><ul><li>Asymmetric encryption (Public key encryption)
  19. 19. Symmetric encryption </li></ul><li>Adrianna wants to send Melissa a message... </li></ul>
  20. 20. How Does It Work? (cont.) Asymmetric Encryption
  21. 21. How does it work? (cont.) Symmetric Encryption
  22. 22. Pros and Cons Pros Cons Keeps it confidential Needs to be maintained Very reliable Sometimes high costs $$ Encrypt as much as you want Compatibility? Time consuming for the computer
  23. 23. Real Life Examples <ul><li>Used in the military and the government
  24. 24. Now used in everyday life: </li><ul><li>Online banking
  25. 25. E-commerce
  26. 26. Student records, health records, tax records etc.
  27. 27. ATM machines
  28. 28. Social networking (emails, texts, instant messengers)
  29. 29. Businesses </li></ul></ul>

×