Presentation is loading. Please wait.

Presentation is loading. Please wait.

Encryption Objective 1: Explain data encryption procedures.

Similar presentations


Presentation on theme: "Encryption Objective 1: Explain data encryption procedures."— Presentation transcript:

1 Encryption Objective 1: Explain data encryption procedures.

2 Encryption The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.datasecurityread filekey passworddecryptplain textcipher text Web Media Brands Inc., "What is encryption?." Webopedia. March 2004. 28 Jul 2009.

3 Encryption allows us to…. Share sensitive information with others such as:  Credit-Card Information  Social Security Number  Bank account information  Private conversations  ETC.

4 Encryption Allows you to encode information in a way that only the person (or computer) with the key can view the information. This definitely helps keep information secure!

5 2 types of Encryption Symmetric Key Encryption Public-Key Encryption

6 Symmetric Key Encryption Each computer has a secret key (code) that it uses to encrypt information before it is sent to another computer Requires that you know which computer it will be talking to because the key needs to be on each computer

7 Public-Key Encryption Uses 2 different keys at one time- a combo of a private key and public key Your computer knows only the private key while the public key is given out by your computer to any computer that wants to communicate securily with it.

8 Public-Key Encryption-Large Scale Large scale example: secure web server Uses digital certificates

9 Digital Certificates A unique piece of code or a large number that says the web server is trusted by the certificate authority

10 Certificate Authority It confirms that each computer is who it says it is and provides the public keys of each other Acts as the middle man between the computer and the web server.

11 Encryption When you are online and want to know if the information is being encrypted, you can look for the lock to show in the browser. Lock

12 Authentication Used to verify the information that is being sent is from a trusted source Ways to authentic:  Username/password  Pass cards: card with a magnetic strip or computer chip  Digital Signature: a private key code know only by the originator  Fingerprint Scan  Retina Scan  Face Scan  Voice Identification

13 Easy Example of Encryption Bank Cards:  Consumer swipes the card  The consumer enters a pin code Pin codes can be encrypted on the bank’s computer or encrypted on the card itself.  Bank’s computer recognizes the pin and allows the transaction to take place.


Download ppt "Encryption Objective 1: Explain data encryption procedures."

Similar presentations


Ads by Google