Upload
eustacia-leonard
View
216
Download
6
Embed Size (px)
Citation preview
Encryption
Objective 1: Explain data encryption procedures.
Encryption
The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
Web Media Brands Inc., "What is encryption?." Webopedia. March 2004. 28 Jul 2009 <http://www.webopedia.com/term/e/encryption.html>.
Encryption allows us to….
Share sensitive information with others such as: Credit-Card Information Social Security Number Bank account information Private conversations ETC.
Encryption
Allows you to encode information in a way that only the person (or computer) with the key can view the information.
This definitely helps keep information secure!
2 types of Encryption
Symmetric Key Encryption Public-Key Encryption
Symmetric Key Encryption
Each computer has a secret key (code) that it uses to encrypt information before it is sent to another computer
Requires that you know which computer it will be talking to because the key needs to be on each computer
Public-Key Encryption
Uses 2 different keys at one time- a combo of a private key and public key
Your computer knows only the private key while the public key is given out by your computer to any computer that wants to communicate securily with it.
Public-Key Encryption-Large Scale
Large scale example: secure web server
Uses digital certificates
Digital Certificates
A unique piece of code or a large number that says the web server is trusted by the certificate authority
Certificate Authority
It confirms that each computer is who it says it is and provides the public keys of each other
Acts as the middle man between the computer and the web server.
Encryption
When you are online and want to know if the information is being encrypted, you can look for the lock to show in the browser.
Lock
Authentication
Used to verify the information that is being sent is from a trusted source
Ways to authentic: Username/password Pass cards: card with a magnetic strip or computer chip Digital Signature: a private key code know only by the
originator Fingerprint Scan Retina Scan Face Scan Voice Identification
Easy Example of Encryption
Bank Cards: Consumer swipes the card The consumer enters a pin code
Pin codes can be encrypted on the bank’s computer or encrypted on the card itself.
Bank’s computer recognizes the pin and allows the transaction to take place.