TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Web Presen
1. How Encryption for Strong
Security Works
About File Encryption
About Link encryption
About WAN
About VPN
Group F
How Encryption for Strong Security Works – p.1/6
2. About File Encryption
File Encryption is scrambling process in which
•
files are made unreadable until the specific
decryption method has been employed. The most
common use of software file encryption is to
protect your private files, documents and
informations. Cryptography is an old science and
it has been used for decades by governments and
armies around the world to protect their
confidential data. Nowadays, cryptography took
its place in our computers, allowing ordinary
users to use the most advanced algorithms to
protect their private files.
How Encryption for Strong Security Works – p.2/6
3. About Link encryption
Link encryption is an approach to
•
communications security that encrypts and
decrypts all traffic at each end of a
communications line (e.g. a teletype circuit). It
contrasts with end-to-end encryption where
messages are encrypted by the sender at the point
of origin and only decrypted by the intended
receiver. Link encryption offers a couple of
advantages:
How Encryption for Strong Security Works – p.3/6
4. About WAN
is a computer network that covers a broad area
•
(i.e., any network whose communications links
cross metropolitan, regional, or national
boundaries ). Less formally, a WAN is a wireless
network that uses routers and public
communications links [1]. Contrast with personal
area networks , local area networks , campus area
networks , or metropolitan area networks which
are usually limited to a room, building, campus or
specific metropolitan area respectively. The
largest and most well-known example of a WAN
is the Internet.
How Encryption for Strong Security Works – p.4/6
5. About VPN
VPN is a computer network in which some of the
•
links between nodes are carried by open
connections or virtual circuits in some larger
network instead of by physical wires. The
link-layer protocols of the virtual network are
said to be tunneled through the larger network
when this is the case. One common application is
secure communications through the public
Internet, but a VPN need not have explicit
security features, such as authentication or
content encryption. VPNs, for example, can be
used to separate the traffic of different user
communities over an underlying network with
strong security features.
How Encryption for Strong Security Works – p.5/6
6. Reference
http://ja.wikipedia.org/wiki/Wiki
•
http://chiebukuro.yahoo.co.jp/
•
How Encryption for Strong Security Works – p.6/6