SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
How Network
       Management Systems Work
●   Public key
●   VPN
●   Link encryption
●   DES and AES
Public key
      ●   Encryption is process of
          transforming information
          for secure personal data.
          Other person can't read
          information that is
          encrypted.
      ●   Public key cryptosystem
          is one of encryption
          method. It use two keys
          for encrypt a message
          and decrypt it. The two
          keys is different.
Link encryption
●   The link
    encryption,and it is an
    encryption,and
    security process of
    data as information.
●   It is transmitted in the
    network between two
    points as a level.
DES and AES
●   DES is stands for the Data
    Encryption Standard. DES
    is one of block cipher(a
    form of shared secret
    encryption). DES is based
    on common key
    cryptosystem that uses 56-
    bit key.
●   AES is stands for the
    Advanced Encryption
    Standard. AES is also
    common key cryptosystem.
     AES is version of improved
    DES's security.
VPN
  ●   The Virtual Private
      Network is called the
      VPN for short.
  ●   VPN is the service for
      electronic
      communications
      company or artifice
      which connect up to
      LAN.
References
●   Wikipedia
       hap://ja.wikipedia.org/wiki

Weitere ähnliche Inhalte

Was ist angesagt?

Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Guellord Mpia
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...IGEEKS TECHNOLOGIES
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Nexgen Technology
 
How encryption works
How encryption worksHow encryption works
How encryption workss1180012
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Sai Natkar
 
fucking shit
fucking shitfucking shit
fucking shiteyalrav
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
 
Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergentJayakrishnan U
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsReza Rahimi
 

Was ist angesagt? (17)

Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
Week13
Week13Week13
Week13
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Week 12 slide
Week 12 slideWeek 12 slide
Week 12 slide
 
126689454 jv6
126689454 jv6126689454 jv6
126689454 jv6
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology! Data Encryption : A Powerful and an Approachable Technology!
Data Encryption : A Powerful and an Approachable Technology!
 
fucking shit
fucking shitfucking shit
fucking shit
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Secure deduplicaton with efficient and reliable convergent
Secure deduplicaton with  efficient and reliable   convergentSecure deduplicaton with  efficient and reliable   convergent
Secure deduplicaton with efficient and reliable convergent
 
$ii7oi5i-12
$ii7oi5i-12$ii7oi5i-12
$ii7oi5i-12
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
 

Andere mochten auch

Institute für Trend- und Zukunftsforschung (IZT)
Institute für Trend- und Zukunftsforschung (IZT)Institute für Trend- und Zukunftsforschung (IZT)
Institute für Trend- und Zukunftsforschung (IZT)Innovation Norway
 
Was kommt? Methoden und ausgewählte Ergebnisse der Zukunftsforschung zum Lern...
Was kommt? Methoden und ausgewählte Ergebnisse der Zukunftsforschung zum Lern...Was kommt? Methoden und ausgewählte Ergebnisse der Zukunftsforschung zum Lern...
Was kommt? Methoden und ausgewählte Ergebnisse der Zukunftsforschung zum Lern...Sandra Schön (aka Schoen)
 
pulte homes Compensation
pulte homes Compensationpulte homes Compensation
pulte homes Compensationfinance42
 
Hi Performance Manufacturing
Hi Performance ManufacturingHi Performance Manufacturing
Hi Performance ManufacturingAlex Diong
 

Andere mochten auch (6)

Institute für Trend- und Zukunftsforschung (IZT)
Institute für Trend- und Zukunftsforschung (IZT)Institute für Trend- und Zukunftsforschung (IZT)
Institute für Trend- und Zukunftsforschung (IZT)
 
Zukunftsforschung - Wie wird sich technologiegestütztes Lernen entwickeln?
Zukunftsforschung - Wie wird sich technologiegestütztes Lernen entwickeln?Zukunftsforschung - Wie wird sich technologiegestütztes Lernen entwickeln?
Zukunftsforschung - Wie wird sich technologiegestütztes Lernen entwickeln?
 
Was kommt? Methoden und ausgewählte Ergebnisse der Zukunftsforschung zum Lern...
Was kommt? Methoden und ausgewählte Ergebnisse der Zukunftsforschung zum Lern...Was kommt? Methoden und ausgewählte Ergebnisse der Zukunftsforschung zum Lern...
Was kommt? Methoden und ausgewählte Ergebnisse der Zukunftsforschung zum Lern...
 
pulte homes Compensation
pulte homes Compensationpulte homes Compensation
pulte homes Compensation
 
3 Great Questions
3 Great Questions3 Great Questions
3 Great Questions
 
Hi Performance Manufacturing
Hi Performance ManufacturingHi Performance Manufacturing
Hi Performance Manufacturing
 

Ähnlich wie Week13 Slides

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 
Software for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationSoftware for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationRuchika Sinha
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesMurali Krishna
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
How encryption works
How encryption worksHow encryption works
How encryption worksaizu_u-11911
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1Amanda2345
 
Linux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxLinux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxBrenoMeister
 

Ähnlich wie Week13 Slides (20)

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
Week13
Week13Week13
Week13
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
Cryptography Cryptography
Cryptography
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 
Software for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentationSoftware for encrypting and decrypting text file powerpointpresentation
Software for encrypting and decrypting text file powerpointpresentation
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Enhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
LAN's by Group 1
LAN's by Group 1LAN's by Group 1
LAN's by Group 1
 
Week13
Week13Week13
Week13
 
Phase1
Phase1Phase1
Phase1
 
Linux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxLinux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsx
 
Cryptography
CryptographyCryptography
Cryptography
 

Mehr von c001ick

Peer review4
Peer review4Peer review4
Peer review4c001ick
 
Peer review5
Peer review5Peer review5
Peer review5c001ick
 
Peer review2
Peer review2Peer review2
Peer review2c001ick
 
Peer review1
Peer review1Peer review1
Peer review1c001ick
 
Complete document4
Complete document4Complete document4
Complete document4c001ick
 
Complete document3
Complete document3Complete document3
Complete document3c001ick
 
Comlete document1
Comlete document1Comlete document1
Comlete document1c001ick
 
Individual sections5
Individual sections5Individual sections5
Individual sections5c001ick
 
Individual sections4
Individual sections4Individual sections4
Individual sections4c001ick
 
Indivisual sections3
Indivisual sections3Indivisual sections3
Indivisual sections3c001ick
 
Individual sections2
Individual sections2Individual sections2
Individual sections2c001ick
 
Individual sections1
Individual sections1Individual sections1
Individual sections1c001ick
 
Presen4 1
Presen4 1Presen4 1
Presen4 1c001ick
 
Week12 presen3
Week12 presen3Week12 presen3
Week12 presen3c001ick
 
Presentation4 2
Presentation4 2Presentation4 2
Presentation4 2c001ick
 
Week12 presen3
Week12 presen3Week12 presen3
Week12 presen3c001ick
 
Week10 cmap
Week10 cmapWeek10 cmap
Week10 cmapc001ick
 
Week9 slilde
Week9 slildeWeek9 slilde
Week9 slildec001ick
 
Week9 slilde
Week9 slildeWeek9 slilde
Week9 slildec001ick
 
Week5 presentation
Week5 presentationWeek5 presentation
Week5 presentationc001ick
 

Mehr von c001ick (20)

Peer review4
Peer review4Peer review4
Peer review4
 
Peer review5
Peer review5Peer review5
Peer review5
 
Peer review2
Peer review2Peer review2
Peer review2
 
Peer review1
Peer review1Peer review1
Peer review1
 
Complete document4
Complete document4Complete document4
Complete document4
 
Complete document3
Complete document3Complete document3
Complete document3
 
Comlete document1
Comlete document1Comlete document1
Comlete document1
 
Individual sections5
Individual sections5Individual sections5
Individual sections5
 
Individual sections4
Individual sections4Individual sections4
Individual sections4
 
Indivisual sections3
Indivisual sections3Indivisual sections3
Indivisual sections3
 
Individual sections2
Individual sections2Individual sections2
Individual sections2
 
Individual sections1
Individual sections1Individual sections1
Individual sections1
 
Presen4 1
Presen4 1Presen4 1
Presen4 1
 
Week12 presen3
Week12 presen3Week12 presen3
Week12 presen3
 
Presentation4 2
Presentation4 2Presentation4 2
Presentation4 2
 
Week12 presen3
Week12 presen3Week12 presen3
Week12 presen3
 
Week10 cmap
Week10 cmapWeek10 cmap
Week10 cmap
 
Week9 slilde
Week9 slildeWeek9 slilde
Week9 slilde
 
Week9 slilde
Week9 slildeWeek9 slilde
Week9 slilde
 
Week5 presentation
Week5 presentationWeek5 presentation
Week5 presentation
 

Kürzlich hochgeladen

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 

Kürzlich hochgeladen (20)

activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 

Week13 Slides

  • 1. How Network Management Systems Work ● Public key ● VPN ● Link encryption ● DES and AES
  • 2. Public key ● Encryption is process of transforming information for secure personal data. Other person can't read information that is encrypted. ● Public key cryptosystem is one of encryption method. It use two keys for encrypt a message and decrypt it. The two keys is different.
  • 3. Link encryption ● The link encryption,and it is an encryption,and security process of data as information. ● It is transmitted in the network between two points as a level.
  • 4. DES and AES ● DES is stands for the Data Encryption Standard. DES is one of block cipher(a form of shared secret encryption). DES is based on common key cryptosystem that uses 56- bit key. ● AES is stands for the Advanced Encryption Standard. AES is also common key cryptosystem. AES is version of improved DES's security.
  • 5. VPN ● The Virtual Private Network is called the VPN for short. ● VPN is the service for electronic communications company or artifice which connect up to LAN.
  • 6. References ● Wikipedia hap://ja.wikipedia.org/wiki