Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Encryption presentation final

31,255 views

Published on

Published in: Technology
  • My struggles with my dissertation were long gone since the day I contacted Emily for my dissertation help. Great assistance by guys from ⇒⇒⇒WRITE-MY-PAPER.net ⇐⇐⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Writing good research paper is quite easy and very difficult simultaneously. It depends on the individual skill set also. You can get help from research paper writing. Check out, please ⇒ www.HelpWriting.net ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Writing a good research paper isn't easy and it's the fruit of hard work. For help you can check writing expert. Check out, please ⇒ www.WritePaper.info ⇐ I think they are the best
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Yes you are right. There are many research paper writing services available now. But almost services are fake and illegal. Only a genuine service will treat their customer with quality research papers. ⇒ www.WritePaper.info ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • To get professional research papers you must go for experts like ⇒ www.HelpWriting.net ⇐
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Encryption presentation final

  1. 1. Encryption By: Melissa Wong and Adrianna Djie
  2. 2. Table of Contents <ul>We will be talking about... <li>What is Encryption?
  3. 3. Why Do We Use Encryption?
  4. 4. How Does It Work? (x3)
  5. 5. Pros and Cons
  6. 6. Real Life Examples </li></ul>
  7. 7. What is Encryption? <ul><li>Encryption: The process of coding text
  8. 8. Decryption: The process of decoding text </li><ul><li>Decryption is the opposite of encryption </li></ul><li>A security method used to protect data </li><ul><li>Files on computers
  9. 9. Data being passed through the Internet </li><ul><li>ATM machines
  10. 10. E-Commerce
  11. 11. Facebook password </li></ul></ul></ul>
  12. 12. Why Do We Use Encryption? <ul><li>To secure important information e.g. : </li><ul><li>Health records
  13. 13. Credit card information
  14. 14. Student records
  15. 15. Etc. </li></ul><li>Prevents information from getting stolen or read
  16. 16. Without encryption, there is no reliable security </li></ul>
  17. 17. How Does It Work? <ul><li>Encryption allows the sender to transform data from plain text into ciphertext by using a key </li><ul><li>Ciphertext: coded text
  18. 18. Key: what is used to encrypt and decrypt text </li></ul><li>Two different types of encryption: </li><ul><li>Asymmetric encryption (Public key encryption)
  19. 19. Symmetric encryption </li></ul><li>Adrianna wants to send Melissa a message... </li></ul>
  20. 20. How Does It Work? (cont.) Asymmetric Encryption
  21. 21. How does it work? (cont.) Symmetric Encryption
  22. 22. Pros and Cons Pros Cons Keeps it confidential Needs to be maintained Very reliable Sometimes high costs $$ Encrypt as much as you want Compatibility? Time consuming for the computer
  23. 23. Real Life Examples <ul><li>Used in the military and the government
  24. 24. Now used in everyday life: </li><ul><li>Online banking
  25. 25. E-commerce
  26. 26. Student records, health records, tax records etc.
  27. 27. ATM machines
  28. 28. Social networking (emails, texts, instant messengers)
  29. 29. Businesses </li></ul></ul>

×