ENCRYPTION - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

ENCRYPTION

Description:

... encryption because someone could 'steal' the key and decode the messages. But because of its speed, it's commonly used for e-commerce transactions. ... – PowerPoint PPT presentation

Number of Views:57
Avg rating:3.0/5.0
Slides: 15
Provided by: hpcus879
Category:

less

Transcript and Presenter's Notes

Title: ENCRYPTION


1
ENCRYPTION
  • By Group 3

Karilyn Lao, Richman Lo, Robert Mastronardi
2
What is encryption?
  • A process that converts original information,
    also called plain text into a difficult-to-interpr
    et form called ciphertext.
  • Done by using an encryption algorithm, a formula
    used to turn plain text into ciphertext.
  • Two types Asymmetric and Symmetric

3
Asymmetric Encryption
4
Symmetric Encryption
5
Which one is better?
  • Although, symmetric encryption is fast, it is not
    as safe as asymmetric encryption because someone
    could steal the key and decode the messages.
    But because of its speed, it's commonly used for
    e-commerce transactions.
  • Asymmetric encryption is more complex--and more
    secure. Asymmetric encryption's added safety
    comes at a price More computation is required,
    so the process takes longer.

6
Whos using encryption?
  • If you use a computer and the internet, youre
    using encryption!
  • Enables all organizations regardless of their
    size, to be both user-and-IT friendly.

7
Why use encryption?
  • Authentication
  • Protects personal data such as passwords.
  • Privacy
  • Provides for confidentiality of private
    information.
  • Integrity
  • Ensures that a document or file has not been
    altered.
  • Accountability
  • Prevents denial or plagiarism.

8
How do you manage encryption?
  • Make sure the encryption system has a complete
    key management application.
  • This will help manage and protect the data and
    keys, and help you safely match encrypted data
    with the right key.

9
Examples of Encryption
  • Web browser encryption
  • Email encryption
  • Hard drive encryption
  • Operating system protection

10
A few vendors and their product coverage
  • Blackberry
  • System, software, hardware, and service.
  • Global Technologies Group, Inc. (GTGI)
  • Software and hardware.
  • Hewlett-Packard Company
  • System, software, hardware, and service.
  • Intellect Security Ltd.
  • Software

11
How prevalent is it?
  • According to InformationWeek Research
  • Of 500 sites surveyed, two-thirds report using
    encryption to protect company data.
  • Of 500 companies surveyed, 43 use encryption on
    both stored and transmitted data. More than three
    out of five companies encrypt due to the threat
    of outsiders intercepting sensitive data.

Continued
12
  • Of 28 of sites surveyed, government regulation
    requires encryption of stored and transmitted
    data.
  • For 38 of companies, the complexity of the
    technology is an obstacle.
  • Some businesses arent able to use the technology
    because of the lack of skilled IT personnel and
    budget limitations.

13
Want more???
  • More on what encryption is
  • http//cplus.about.com/od/introductiontoprogrammin
    g/p/encryption.htm
  • http//www.pcworld.com/article/id,15230/article.ht
    ml
  • http//www.encyclopedia.com/doc/1G1-144388099.html
  • http//www.informationweek.com/news/showArticle.jh
    tml?articleID6507540
  • http//security.homeoffice.gov.uk/ripa/encryption/
    types-of-encryption/
  • http//www.itworld.com/nl/unix_sec/01242002/
  • http//www.pcmag.com/encyclopedia_term/0,2542,ten
    cryptionalgorithmi42595,00.asp
  • More on vendors and more detailed products
  • http//securitypark.bitpipe.com/olist/Data-Encrypt
    ion.html

14
Questions???
Write a Comment
User Comments (0)
About PowerShow.com