How Encryption for Strong
Security Works
s1160152,s1160153,s1160154,s1160155
First
⇨ Networks use three ways of encryption.
⇨ Those are data, file, and link encryption.
⇨ File encryption protects fi...
Second
⇨ An encryption program uses a string of nu-
mbers called a key.
⇨ The real data is buried in the pseudora-
nd...
Third
⇨ Routers can use encryption to protect the
entire stream of data.
⇨ This is called link encryption.
Forth
⇨ Local file encryption protects data
from physical intrusion.
Fifth
⇨ VPN client software creates an encrypted
tunnel to the firewall/VPN server.
⇨ A VPN is a form of link encryptio...
Sixth
⇨ The destination device uses the same numeric
key to cancel out the pseudorandom noise and
extract the real da...
of 7

presenw13

ok.
Published on: Mar 4, 2016
Published in: Education      Technology      
Source: www.slideshare.net


Transcripts - presenw13

  • 1. How Encryption for Strong Security Works s1160152,s1160153,s1160154,s1160155
  • 2. First ⇨ Networks use three ways of encryption. ⇨ Those are data, file, and link encryption. ⇨ File encryption protects files.
  • 3. Second ⇨ An encryption program uses a string of nu- mbers called a key. ⇨ The real data is buried in the pseudora- ndom noise. ⇨ This is called data encryption.
  • 4. Third ⇨ Routers can use encryption to protect the entire stream of data. ⇨ This is called link encryption.
  • 5. Forth ⇨ Local file encryption protects data from physical intrusion.
  • 6. Fifth ⇨ VPN client software creates an encrypted tunnel to the firewall/VPN server. ⇨ A VPN is a form of link encryption often used across a private network or interne- t.
  • 7. Sixth ⇨ The destination device uses the same numeric key to cancel out the pseudorandom noise and extract the real data.