SlideShare a Scribd company logo
How Encryption for Strong Security Works Group Web Presentation Week13 s1160003 Katsushige Asahara s1160004 Haruka Anazawa s1160016 Junko Isii
Data Encryption Data encryption is the conversion of data into a form, called a cipher, that cannot be understood by unauthorized people.
File Encryption To protect files and folders from attackers,  users use the Encrypting File System(EFS). The EFS is available in Microsoft's Windows 2000 and  later OS. EFS works by encrypting a file with a symmetric key and a user's public key. To decrypt the file, user needs user's private key and the symmetric key.
Link Encryption The link encryption is a phased protection of the data that trade-off between two points in  the network provided by encrypting data separately in each network link.
VPN The service that can use a public line as if it is a dedicated line. It is used for connection between the footholds of the network in the company, and it is cost-cut than I introduce a dedicated line into the backbone of the carrier by I “ride together”, and doing it.
Encryption program Encryption program,usually in firmware, use a string of numbers called a key to create a stream of data combining the real information.

More Related Content

PPTX
Cassandra
PPT
PPTX
Balancing Customer Privacy with Transparency
 
PDF
無題 1
PDF
How encryption works
DOCX
message passing interface
PPT
Afp 2011 Camera Phone Fundraising
ODP
Week12presen
Cassandra
Balancing Customer Privacy with Transparency
 
無題 1
How encryption works
message passing interface
Afp 2011 Camera Phone Fundraising
Week12presen

Viewers also liked (7)

PPTX
Recreating the Wheel is for Cavemen!
PPT
Ffr11 Capital Appeal Communication Slide Base 09.05.11
PPTX
Hsbc Breakfast 2011
PPTX
Ifc Fundraiserpreneur 22.06.10
PPTX
Starting To Fundraise 2011
PPTX
Ifc & Capital Appeals 10.02.11
PPTX
Goog 411
Recreating the Wheel is for Cavemen!
Ffr11 Capital Appeal Communication Slide Base 09.05.11
Hsbc Breakfast 2011
Ifc Fundraiserpreneur 22.06.10
Starting To Fundraise 2011
Ifc & Capital Appeals 10.02.11
Goog 411
Ad

Similar to Week13presen (20)

PDF
Week13presentation
ODP
Web Presentation 13
ODP
Week13
ODP
Week13
ODP
Week13
PDF
Week13
PDF
Week13
ODP
Week13
PDF
Security F
PDF
How Encryption for Strong Security Works
PPTX
Types of VPN
PDF
Cn36539543
PDF
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
DOCX
INTRODUCTION
DOCX
college assignment on Applications of ipsec
PDF
Gwp Week13
 
ODP
Week13
ODP
Week13
PPTX
CN presentation on the topic of osi model
PPT
Network Security 2016
Week13presentation
Web Presentation 13
Week13
Week13
Week13
Week13
Week13
Week13
Security F
How Encryption for Strong Security Works
Types of VPN
Cn36539543
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
INTRODUCTION
college assignment on Applications of ipsec
Gwp Week13
 
Week13
Week13
CN presentation on the topic of osi model
Network Security 2016
Ad

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Modernizing your data center with Dell and AMD
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced Soft Computing BINUS July 2025.pdf
Cloud computing and distributed systems.
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectral efficient network and resource selection model in 5G networks

Week13presen

  • 1. How Encryption for Strong Security Works Group Web Presentation Week13 s1160003 Katsushige Asahara s1160004 Haruka Anazawa s1160016 Junko Isii
  • 2. Data Encryption Data encryption is the conversion of data into a form, called a cipher, that cannot be understood by unauthorized people.
  • 3. File Encryption To protect files and folders from attackers, users use the Encrypting File System(EFS). The EFS is available in Microsoft's Windows 2000 and later OS. EFS works by encrypting a file with a symmetric key and a user's public key. To decrypt the file, user needs user's private key and the symmetric key.
  • 4. Link Encryption The link encryption is a phased protection of the data that trade-off between two points in the network provided by encrypting data separately in each network link.
  • 5. VPN The service that can use a public line as if it is a dedicated line. It is used for connection between the footholds of the network in the company, and it is cost-cut than I introduce a dedicated line into the backbone of the carrier by I “ride together”, and doing it.
  • 6. Encryption program Encryption program,usually in firmware, use a string of numbers called a key to create a stream of data combining the real information.