SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
How Encryption for Strong
    Security Works
     About File Encryption
     About Link encryption
         About WAN
         About VPN
            Group F




                        How Encryption for Strong Security Works – p.1/6
About File Encryption
      File Encryption is scrambling process in which
  •
      files are made unreadable until the specific
      decryption method has been employed. The most
      common use of software file encryption is to
      protect your private files, documents and
      informations. Cryptography is an old science and
      it has been used for decades by governments and
      armies around the world to protect their
      confidential data. Nowadays, cryptography took
      its place in our computers, allowing ordinary
      users to use the most advanced algorithms to
      protect their private files.


                                      How Encryption for Strong Security Works – p.2/6
About Link encryption
      Link encryption is an approach to
  •
      communications security that encrypts and
      decrypts all traffic at each end of a
      communications line (e.g. a teletype circuit). It
      contrasts with end-to-end encryption where
      messages are encrypted by the sender at the point
      of origin and only decrypted by the intended
      receiver. Link encryption offers a couple of
      advantages:




                                      How Encryption for Strong Security Works – p.3/6
About WAN
     is a computer network that covers a broad area
 •
     (i.e., any network whose communications links
     cross metropolitan, regional, or national
     boundaries ). Less formally, a WAN is a wireless
     network that uses routers and public
     communications links [1]. Contrast with personal
     area networks , local area networks , campus area
     networks , or metropolitan area networks which
     are usually limited to a room, building, campus or
     specific metropolitan area respectively. The
     largest and most well-known example of a WAN
     is the Internet.


                                      How Encryption for Strong Security Works – p.4/6
About VPN
     VPN is a computer network in which some of the
 •
     links between nodes are carried by open
     connections or virtual circuits in some larger
     network instead of by physical wires. The
     link-layer protocols of the virtual network are
     said to be tunneled through the larger network
     when this is the case. One common application is
     secure communications through the public
     Internet, but a VPN need not have explicit
     security features, such as authentication or
     content encryption. VPNs, for example, can be
     used to separate the traffic of different user
     communities over an underlying network with
     strong security features.
                                    How Encryption for Strong Security Works – p.5/6
Reference
     http://ja.wikipedia.org/wiki/Wiki
 •

     http://chiebukuro.yahoo.co.jp/
 •




                                     How Encryption for Strong Security Works – p.6/6

Contenu connexe

Tendances

02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 
sw2 week13
sw2 week13sw2 week13
sw2 week13
s1170113
 
English Week13
English Week13English Week13
English Week13
s1160202
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
s116num
 

Tendances (19)

Network Security Fundamental
Network Security FundamentalNetwork Security Fundamental
Network Security Fundamental
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...Physical data security & security of data over network by team netnepz- A...
Physical data security & security of data over network by team netnepz- A...
 
A framework for securing wireless home networks 1
A framework for securing wireless home networks 1A framework for securing wireless home networks 1
A framework for securing wireless home networks 1
 
Cryptppt1
Cryptppt1Cryptppt1
Cryptppt1
 
Network Security
Network SecurityNetwork Security
Network Security
 
Covert networks
Covert networksCovert networks
Covert networks
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Cisco security
Cisco securityCisco security
Cisco security
 
Steganography
SteganographySteganography
Steganography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
sw2 week13
sw2 week13sw2 week13
sw2 week13
 
Steganography
SteganographySteganography
Steganography
 
English Week13
English Week13English Week13
English Week13
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Web Security
Web SecurityWeb Security
Web Security
 
Firewall
FirewallFirewall
Firewall
 
Network security
Network securityNetwork security
Network security
 
Treball seguretat wifi
Treball seguretat wifiTreball seguretat wifi
Treball seguretat wifi
 

En vedette

积极心态培训
积极心态培训积极心态培训
积极心态培训
20004
 
Lumea.se.schimba
Lumea.se.schimbaLumea.se.schimba
Lumea.se.schimba
Nicky Nic
 
Pietrele misterioase
Pietrele misterioasePietrele misterioase
Pietrele misterioase
Nicky Nic
 
1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi
Nicky Nic
 
1. remedii naturiste
1. remedii naturiste1. remedii naturiste
1. remedii naturiste
Nicky Nic
 
Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)
20004
 
员工胜任力模型及标准
员工胜任力模型及标准员工胜任力模型及标准
员工胜任力模型及标准
20004
 
高效的团队管理
高效的团队管理高效的团队管理
高效的团队管理
20004
 
Sss Felicitare De 8 Martie
Sss Felicitare De 8 MartieSss Felicitare De 8 Martie
Sss Felicitare De 8 Martie
Nicky Nic
 
Nlp致胜行销学
Nlp致胜行销学Nlp致胜行销学
Nlp致胜行销学
20004
 
心态调整及认同
心态调整及认同心态调整及认同
心态调整及认同
20004
 
应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)
20004
 
Fisher sharks
Fisher sharksFisher sharks
Fisher sharks
vermigle
 
Chinatown vocab
Chinatown vocabChinatown vocab
Chinatown vocab
vermigle
 
Mesaje de an nou.
Mesaje de an nou.Mesaje de an nou.
Mesaje de an nou.
Nicky Nic
 
A trip to the firehouse
A trip to the firehouseA trip to the firehouse
A trip to the firehouse
vermigle
 

En vedette (20)

ναυαγιο αντικυθηρων
ναυαγιο αντικυθηρωνναυαγιο αντικυθηρων
ναυαγιο αντικυθηρων
 
积极心态培训
积极心态培训积极心态培训
积极心态培训
 
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
ΕΚΘΕΣΗ ΤΕΧΝΟΛΟΓΙΑΣ 2012 -2013
 
Lumea.se.schimba
Lumea.se.schimbaLumea.se.schimba
Lumea.se.schimba
 
Pietrele misterioase
Pietrele misterioasePietrele misterioase
Pietrele misterioase
 
1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi1.spumosul profesor moisil_lumi
1.spumosul profesor moisil_lumi
 
1. remedii naturiste
1. remedii naturiste1. remedii naturiste
1. remedii naturiste
 
Official power point paynes prairie
Official power point   paynes prairieOfficial power point   paynes prairie
Official power point paynes prairie
 
Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)Ccmt企业教练管理工作坊(下)
Ccmt企业教练管理工作坊(下)
 
员工胜任力模型及标准
员工胜任力模型及标准员工胜任力模型及标准
员工胜任力模型及标准
 
高效的团队管理
高效的团队管理高效的团队管理
高效的团队管理
 
Sss Felicitare De 8 Martie
Sss Felicitare De 8 MartieSss Felicitare De 8 Martie
Sss Felicitare De 8 Martie
 
2011-04-25 comments on Readability and Consistency for v5 Consultation
2011-04-25  comments on Readability and Consistency for v5 Consultation2011-04-25  comments on Readability and Consistency for v5 Consultation
2011-04-25 comments on Readability and Consistency for v5 Consultation
 
Nlp致胜行销学
Nlp致胜行销学Nlp致胜行销学
Nlp致胜行销学
 
心态调整及认同
心态调整及认同心态调整及认同
心态调整及认同
 
应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)应聘人员综合素质测试题(Pdf 9)
应聘人员综合素质测试题(Pdf 9)
 
Fisher sharks
Fisher sharksFisher sharks
Fisher sharks
 
Chinatown vocab
Chinatown vocabChinatown vocab
Chinatown vocab
 
Mesaje de an nou.
Mesaje de an nou.Mesaje de an nou.
Mesaje de an nou.
 
A trip to the firehouse
A trip to the firehouseA trip to the firehouse
A trip to the firehouse
 

Similaire à Web Presen

Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdf
faizasoftic
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
Edie II
 

Similaire à Web Presen (20)

Week13
Week13Week13
Week13
 
A depth detail about vpn security
A depth detail about vpn securityA depth detail about vpn security
A depth detail about vpn security
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
The vpn
The vpnThe vpn
The vpn
 
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhdVAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
VAIBHAV_SAHU_079hdjdjdbvddddhdhdbdbdhdhhd
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Vpn
VpnVpn
Vpn
 
Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdf
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Firewall
Firewall Firewall
Firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...2.espk external agent authentication and session key establishment using publ...
2.espk external agent authentication and session key establishment using publ...
 
V P N
V P NV P N
V P N
 
Network security
Network security Network security
Network security
 

Plus de guest79a91d (18)

Week14
Week14Week14
Week14
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week14
Week14Week14
Week14
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Web Presen
Web PresenWeb Presen
Web Presen
 
Week11
Week11Week11
Week11
 
Week11
Week11Week11
Week11
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 
Web Presentation
Web PresentationWeb Presentation
Web Presentation
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Web Presen

  • 1. How Encryption for Strong Security Works About File Encryption About Link encryption About WAN About VPN Group F How Encryption for Strong Security Works – p.1/6
  • 2. About File Encryption File Encryption is scrambling process in which • files are made unreadable until the specific decryption method has been employed. The most common use of software file encryption is to protect your private files, documents and informations. Cryptography is an old science and it has been used for decades by governments and armies around the world to protect their confidential data. Nowadays, cryptography took its place in our computers, allowing ordinary users to use the most advanced algorithms to protect their private files. How Encryption for Strong Security Works – p.2/6
  • 3. About Link encryption Link encryption is an approach to • communications security that encrypts and decrypts all traffic at each end of a communications line (e.g. a teletype circuit). It contrasts with end-to-end encryption where messages are encrypted by the sender at the point of origin and only decrypted by the intended receiver. Link encryption offers a couple of advantages: How Encryption for Strong Security Works – p.3/6
  • 4. About WAN is a computer network that covers a broad area • (i.e., any network whose communications links cross metropolitan, regional, or national boundaries ). Less formally, a WAN is a wireless network that uses routers and public communications links [1]. Contrast with personal area networks , local area networks , campus area networks , or metropolitan area networks which are usually limited to a room, building, campus or specific metropolitan area respectively. The largest and most well-known example of a WAN is the Internet. How Encryption for Strong Security Works – p.4/6
  • 5. About VPN VPN is a computer network in which some of the • links between nodes are carried by open connections or virtual circuits in some larger network instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. How Encryption for Strong Security Works – p.5/6
  • 6. Reference http://ja.wikipedia.org/wiki/Wiki • http://chiebukuro.yahoo.co.jp/ • How Encryption for Strong Security Works – p.6/6