SlideShare ist ein Scribd-Unternehmen logo
1 von 15
By: Esteban Muñeton, Camilo Pacini, David Silva y
               Freddy Cabrera.
               Colegio Britanico
                      11b
Content.
 Introduction.
 Objective.
 Development of the topic.
 Conclusion.
 References.
Introduction
 On this presentation we´re going to talk about the
 data security and data transfer, and why is it important
 to know about it. Then we will talk about the different
 types of data file types, translating between file
 types, standard file types and rapid transfer of data.
Objective.
 To understand better about data security and data
  transfer.
 To know about more about translating between file
  types.
 And to have a clear idea about Standard File Types and
  Rapid Transfer of Data.
Data Security.
 Data Security means protecting a database from
 destructive forces and the unwanted actions of
 unauthorized users.
Data Transfer
 Data transmission, digital transmission, or digital
  communications is the physical transfer of data (a
  digital bit stream) over a point-to-point or point-to-
  multipoint communication channel. Examples of such
  channels are copper wires, optical fibres, wireless
  communication channels, and storage media. The data
  are represented as an electromagnetic signal, such as
  an electrical voltage, radiowave, microwave, or infrared
  signal.
Data File Types
   Quake 3 archive (.pk3) – (See note on Doom³)
   Doom³ archive (.pk4) – (Opens similarly to a zip archive.)
   RAR Rar Archive (.rar) – for multiple file archive (rar to .r01-.r99 to s01 and so on)
   RAG / RAGS game file, a game playable in the RAGS game-engine, a free program which both allows
    people to create games, and play games, games created have the file format "RAG game file"
   SEN Scifer Archive (.sen) – Scifer Internal Archive Type
   sit/sitx – StuffIt (Macintosh)
   SKB – Google Sketchup Backup File
   tar
   .tar.gz, .tgz – gzipped tar file
   TB (.tb) – Tabbery Virtual Desktop Tab file
   TIB (.tib) – Acronis True Image backup
   uha – Ultra High Archive Compression
   VIV – Archive format used to compress data for several video games, including Need For Speed: High
    Stakes.
   VOL – unknown archive
   VSA – Altiris Virtual Software Archive
   WAX – Wavexpress – A ZIP alternative optimized for packages containing video, allowing multiple
    packaged files to be all-or-none delivered with near-instantaneous unpacking via NTFS file system
    manipulation.
   Z – Unix compress file
   zoo
   zip
   .?Q? – files compressed by the SQ program.
   7z – 7-Zip compressed file
   AAC- Advanced Audio Coding
   ace – ACE compressed file
   ALZ – ALZip compressed file
   APK – Applications installable on Android
   AT3 – Sony's UMD Data compression
   .bke – BackupEarth.com Data compression
   ARC
   ARJ – ARJ compressed file
   BA – Scifer Archive (.ba), Scifer External Archive Type
   big – Special file compression format used by Electronic Arts for compressing the data for many of
    EA's games
   BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools
   BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE
   bzip2 – (.bz2)
   bmp – (paint)
   c4 – JEDMICS image files, a DOD system
   cab – Microsoft Cabinet
   cals – JEDMICS image files, a DOD system
   cpt/sea – Compact Pro (Macintosh)
   DAA – Closed-format, Windows-only compressed disk image
   deb – Debian Linux install package
   DMG – an Apple compressed/encrypted format
   DDZ-file, a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a
    program similar to RAGS, it's mainly used to make somewhat short games.
   EEA – An encrypted CAB, ostensibly for protecting email attachments
   .egg – Alzip Egg Edition compressed file
   EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab
   ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system
    folders, replaced by EGT Universal Document
   ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system.
   GHO (.gho, .ghs) – Norton Ghost
   gzip (.gz) – Compressed file
   IPG (.ipg) – Format in which Apple Inc. packages their iPod games. can be extracted through Winrar
   jar – ZIP file with manifest for use with Java applications.
   LBR – Library file
   LQR – LBR Library file compressed by the SQ program.
   LHA (.lzh) – Lempel, Ziv, Huffman
   lzip (.lz) – Compressed file
   lzo
   lzma
   LZX (algorithm)
   MBRWizard archive (.mbw)
   MPQ Archives (.mpq) – Used by Blizzard games
   MacBinary (.bin)
   NTH (.nth) – Nokia Theme Used by Nokia Series 40 Cellphones
   PAK – Enhanced type of .ARC archive
   Parchive (.par, .par2)
Translating between file Types
 Data conversion is the conversion of computer data
 from one format to another. Throughout a computer
 environment, data is encoded in a variety of ways.
Standard File Types
 The need to import and export data files has led to the
  development of several standard file types that
  many applications can understand. Examples
  are jpg andgif files for images, and mp3 files for
  sound; but there are also standard file types for
  text, movies, and spreadsheet data.
 Often an application of a different type can import
  data, for example, a word processor may be able to
  import a spreadsheet file.
Rapid Transfer of Data
 Files can be easily transferred and shared across the
    globe using the Internet. A file could be:
   emailed as an attachment
   sent over instant messenger
   downloaded from a website/web server
   accessed over a private network
   Documents, eg a spreadsheet, can be stored on a web
    server and then accessed via any computer with
    an Internet connection and a web browser.
    Collaborative working is possible too, where multiple
    people contribute to the same document.
Bibliography
 http://en.wikipedia.org/wiki/Data_security
 http://www.bbc.co.uk/schools/gcsebitesize/ict/databases/datatransfer
    rev4.shtml
   http://www.sevenforums.com/tutorials/19449-default-file-type-
    associations-restore.html
   http://www.osvoffertory.com/CUSTOMERRESOURCES/StandardFileF
    ormatsTAQ.aspx
   http://www.spamlaws.com/data-security.html
   http://www.google.com.co/search?hl=es&biw=1511&bih=741&q=data+se
    curity&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&um=1&ie=UTF-
    8&tbm=isch&source=og&sa=N&tab=wi&ei=PqhrT-
    XbI4yMsALG2siDBg#um=1&hl=es&tbm=isch&sa=1&q=quick+transfer+
    of+data+&oq=quick+transfer+of+data+&aq=f&aqi=&aql=&gs_l=img.3...
    50467l53431l0l54165l10l10l0l0l0l5l312l1919l0j5j4j1l10l0.frgbld.&pbx=1&ba
    v=on.2,or.r_gc.r_pw.r_qf.,cf.osb&fp=fcf666b4750b1ca6&biw=1511&bih=7
    41

Weitere ähnliche Inhalte

Andere mochten auch

11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
keithrozario
 

Andere mochten auch (15)

11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Database modeling and security
Database modeling and securityDatabase modeling and security
Database modeling and security
 
SSL-image
SSL-imageSSL-image
SSL-image
 
RFID based Automatic Pesticide Dosing & Irrigation
RFID based Automatic Pesticide Dosing & IrrigationRFID based Automatic Pesticide Dosing & Irrigation
RFID based Automatic Pesticide Dosing & Irrigation
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
Steganography
SteganographySteganography
Steganography
 
Secure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor networkSecure and efficient data transmission for cluster based wireless sensor network
Secure and efficient data transmission for cluster based wireless sensor network
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
 
Design of Accident Detection and Alert System for Motor Cycles
Design of Accident Detection and Alert System for Motor Cycles Design of Accident Detection and Alert System for Motor Cycles
Design of Accident Detection and Alert System for Motor Cycles
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Steganography
SteganographySteganography
Steganography
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
INTELLIGENT HELMET FOR COAL MINERS
INTELLIGENT HELMET FOR COAL MINERSINTELLIGENT HELMET FOR COAL MINERS
INTELLIGENT HELMET FOR COAL MINERS
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Data security and data transfer

  • 1. By: Esteban Muñeton, Camilo Pacini, David Silva y Freddy Cabrera. Colegio Britanico 11b
  • 2. Content.  Introduction.  Objective.  Development of the topic.  Conclusion.  References.
  • 3. Introduction  On this presentation we´re going to talk about the data security and data transfer, and why is it important to know about it. Then we will talk about the different types of data file types, translating between file types, standard file types and rapid transfer of data.
  • 4. Objective.  To understand better about data security and data transfer.  To know about more about translating between file types.  And to have a clear idea about Standard File Types and Rapid Transfer of Data.
  • 5. Data Security.  Data Security means protecting a database from destructive forces and the unwanted actions of unauthorized users.
  • 6. Data Transfer  Data transmission, digital transmission, or digital communications is the physical transfer of data (a digital bit stream) over a point-to-point or point-to- multipoint communication channel. Examples of such channels are copper wires, optical fibres, wireless communication channels, and storage media. The data are represented as an electromagnetic signal, such as an electrical voltage, radiowave, microwave, or infrared signal.
  • 7.
  • 8. Data File Types  Quake 3 archive (.pk3) – (See note on Doom³)  Doom³ archive (.pk4) – (Opens similarly to a zip archive.)  RAR Rar Archive (.rar) – for multiple file archive (rar to .r01-.r99 to s01 and so on)  RAG / RAGS game file, a game playable in the RAGS game-engine, a free program which both allows people to create games, and play games, games created have the file format "RAG game file"  SEN Scifer Archive (.sen) – Scifer Internal Archive Type  sit/sitx – StuffIt (Macintosh)  SKB – Google Sketchup Backup File  tar  .tar.gz, .tgz – gzipped tar file  TB (.tb) – Tabbery Virtual Desktop Tab file  TIB (.tib) – Acronis True Image backup  uha – Ultra High Archive Compression  VIV – Archive format used to compress data for several video games, including Need For Speed: High Stakes.  VOL – unknown archive  VSA – Altiris Virtual Software Archive  WAX – Wavexpress – A ZIP alternative optimized for packages containing video, allowing multiple packaged files to be all-or-none delivered with near-instantaneous unpacking via NTFS file system manipulation.  Z – Unix compress file  zoo  zip
  • 9. .?Q? – files compressed by the SQ program.  7z – 7-Zip compressed file  AAC- Advanced Audio Coding  ace – ACE compressed file  ALZ – ALZip compressed file  APK – Applications installable on Android  AT3 – Sony's UMD Data compression  .bke – BackupEarth.com Data compression  ARC  ARJ – ARJ compressed file  BA – Scifer Archive (.ba), Scifer External Archive Type  big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games  BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools  BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE  bzip2 – (.bz2)  bmp – (paint)  c4 – JEDMICS image files, a DOD system  cab – Microsoft Cabinet  cals – JEDMICS image files, a DOD system  cpt/sea – Compact Pro (Macintosh)  DAA – Closed-format, Windows-only compressed disk image  deb – Debian Linux install package  DMG – an Apple compressed/encrypted format  DDZ-file, a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games.
  • 10. EEA – An encrypted CAB, ostensibly for protecting email attachments  .egg – Alzip Egg Edition compressed file  EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab  ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document  ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system.  GHO (.gho, .ghs) – Norton Ghost  gzip (.gz) – Compressed file  IPG (.ipg) – Format in which Apple Inc. packages their iPod games. can be extracted through Winrar  jar – ZIP file with manifest for use with Java applications.  LBR – Library file  LQR – LBR Library file compressed by the SQ program.  LHA (.lzh) – Lempel, Ziv, Huffman  lzip (.lz) – Compressed file  lzo  lzma  LZX (algorithm)  MBRWizard archive (.mbw)  MPQ Archives (.mpq) – Used by Blizzard games  MacBinary (.bin)  NTH (.nth) – Nokia Theme Used by Nokia Series 40 Cellphones  PAK – Enhanced type of .ARC archive  Parchive (.par, .par2)
  • 11. Translating between file Types  Data conversion is the conversion of computer data from one format to another. Throughout a computer environment, data is encoded in a variety of ways.
  • 12. Standard File Types  The need to import and export data files has led to the development of several standard file types that many applications can understand. Examples are jpg andgif files for images, and mp3 files for sound; but there are also standard file types for text, movies, and spreadsheet data.  Often an application of a different type can import data, for example, a word processor may be able to import a spreadsheet file.
  • 13. Rapid Transfer of Data  Files can be easily transferred and shared across the globe using the Internet. A file could be:  emailed as an attachment  sent over instant messenger  downloaded from a website/web server  accessed over a private network  Documents, eg a spreadsheet, can be stored on a web server and then accessed via any computer with an Internet connection and a web browser. Collaborative working is possible too, where multiple people contribute to the same document.
  • 14.
  • 15. Bibliography  http://en.wikipedia.org/wiki/Data_security  http://www.bbc.co.uk/schools/gcsebitesize/ict/databases/datatransfer rev4.shtml  http://www.sevenforums.com/tutorials/19449-default-file-type- associations-restore.html  http://www.osvoffertory.com/CUSTOMERRESOURCES/StandardFileF ormatsTAQ.aspx  http://www.spamlaws.com/data-security.html  http://www.google.com.co/search?hl=es&biw=1511&bih=741&q=data+se curity&bav=on.2,or.r_gc.r_pw.r_qf.,cf.osb&um=1&ie=UTF- 8&tbm=isch&source=og&sa=N&tab=wi&ei=PqhrT- XbI4yMsALG2siDBg#um=1&hl=es&tbm=isch&sa=1&q=quick+transfer+ of+data+&oq=quick+transfer+of+data+&aq=f&aqi=&aql=&gs_l=img.3... 50467l53431l0l54165l10l10l0l0l0l5l312l1919l0j5j4j1l10l0.frgbld.&pbx=1&ba v=on.2,or.r_gc.r_pw.r_qf.,cf.osb&fp=fcf666b4750b1ca6&biw=1511&bih=7 41