13
Encryption Objective 1: Explain data encryption procedures.

Encryption Objective 1: Explain data encryption procedures

Embed Size (px)

Citation preview

Page 1: Encryption Objective 1: Explain data encryption procedures

Encryption

Objective 1: Explain data encryption procedures.

Page 2: Encryption Objective 1: Explain data encryption procedures

Encryption

The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

Web Media Brands Inc., "What is encryption?." Webopedia. March 2004. 28 Jul 2009 <http://www.webopedia.com/term/e/encryption.html>.

Page 3: Encryption Objective 1: Explain data encryption procedures

Encryption allows us to….

Share sensitive information with others such as: Credit-Card Information Social Security Number Bank account information Private conversations ETC.

Page 4: Encryption Objective 1: Explain data encryption procedures

Encryption

Allows you to encode information in a way that only the person (or computer) with the key can view the information.

This definitely helps keep information secure!

Page 5: Encryption Objective 1: Explain data encryption procedures

2 types of Encryption

Symmetric Key Encryption Public-Key Encryption

Page 6: Encryption Objective 1: Explain data encryption procedures

Symmetric Key Encryption

Each computer has a secret key (code) that it uses to encrypt information before it is sent to another computer

Requires that you know which computer it will be talking to because the key needs to be on each computer

Page 7: Encryption Objective 1: Explain data encryption procedures

Public-Key Encryption

Uses 2 different keys at one time- a combo of a private key and public key

Your computer knows only the private key while the public key is given out by your computer to any computer that wants to communicate securily with it.

Page 8: Encryption Objective 1: Explain data encryption procedures

Public-Key Encryption-Large Scale

Large scale example: secure web server

Uses digital certificates

Page 9: Encryption Objective 1: Explain data encryption procedures

Digital Certificates

A unique piece of code or a large number that says the web server is trusted by the certificate authority

Page 10: Encryption Objective 1: Explain data encryption procedures

Certificate Authority

It confirms that each computer is who it says it is and provides the public keys of each other

Acts as the middle man between the computer and the web server.

Page 11: Encryption Objective 1: Explain data encryption procedures

Encryption

When you are online and want to know if the information is being encrypted, you can look for the lock to show in the browser.

Lock

Page 12: Encryption Objective 1: Explain data encryption procedures

Authentication

Used to verify the information that is being sent is from a trusted source

Ways to authentic: Username/password Pass cards: card with a magnetic strip or computer chip Digital Signature: a private key code know only by the

originator Fingerprint Scan Retina Scan Face Scan Voice Identification

Page 13: Encryption Objective 1: Explain data encryption procedures

Easy Example of Encryption

Bank Cards: Consumer swipes the card The consumer enters a pin code

Pin codes can be encrypted on the bank’s computer or encrypted on the card itself.

Bank’s computer recognizes the pin and allows the transaction to take place.