Top Banner
ENCRYPTION By Group 3 Karilyn Lao, Richman Lo, & Robert Mastronardi
14
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ENCRYPTION PPT PRESENTATION.ppt

ENCRYPTIONBy Group 3

Karilyn Lao, Richman Lo, & Robert Mastronardi

Page 2: ENCRYPTION PPT PRESENTATION.ppt

What is encryption?

A process that converts original information, also called plain text into a difficult-to-interpret form called ciphertext.

Done by using an encryption algorithm, a formula used to turn plain text into ciphertext.

Two types: Asymmetric and Symmetric

Page 3: ENCRYPTION PPT PRESENTATION.ppt

Asymmetric Encryption

Page 4: ENCRYPTION PPT PRESENTATION.ppt

Symmetric Encryption

Page 5: ENCRYPTION PPT PRESENTATION.ppt

Which one is better?

Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for e-commerce transactions.

Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.

Page 6: ENCRYPTION PPT PRESENTATION.ppt

Who’s using encryption?

If you use a computer and the internet, you’re using encryption!

Enables all organizations regardless of their size, to be both user-and-IT friendly.

Page 7: ENCRYPTION PPT PRESENTATION.ppt

Why use encryption?

Authentication Protects personal data such as passwords.

Privacy Provides for confidentiality of private information.

Accountability Prevents denial or plagiarism.

Integrity Ensures that a document or file has not been

altered.

Page 8: ENCRYPTION PPT PRESENTATION.ppt

How do you manage encryption? Make sure the encryption system has a

complete key management application. This will help manage and protect the data and

keys, and help you safely match encrypted data with the right key.

Page 9: ENCRYPTION PPT PRESENTATION.ppt

Examples of Encryption

Web browser encryption

Email encryption

Hard drive encryption

Operating system protection

Page 10: ENCRYPTION PPT PRESENTATION.ppt

A few vendors and their product coverage Blackberry

System, software, hardware, and service.

Global Technologies Group, Inc. (GTGI) Software and hardware.

Hewlett-Packard Company System, software, hardware, and service.

Intellect Security Ltd. Software

Page 11: ENCRYPTION PPT PRESENTATION.ppt

How prevalent is it?

According to InformationWeek Research: Of 500 sites surveyed, two-thirds report using encryption to protect

company data.

Of 500 companies surveyed, 43% use encryption on both stored and transmitted data. More than three out of five companies encrypt due to the threat of outsiders intercepting sensitive data.

Continued…

Page 12: ENCRYPTION PPT PRESENTATION.ppt

Of 28% of sites surveyed, government regulation requires encryption of stored and transmitted data.

For 38% of companies, the complexity of the technology is an obstacle.

Some businesses aren’t able to use the technology because of the lack of skilled IT personnel and budget limitations.

Page 13: ENCRYPTION PPT PRESENTATION.ppt

Want more???

More on what encryption is… http://cplus.about.com/od/introductiontoprogramming/p/

encryption.htm http://www.pcworld.com/article/id,15230/article.html http://www.encyclopedia.com/doc/1G1-144388099.html http://www.informationweek.com/news/showArticle.jhtml?

articleID=6507540 http://security.homeoffice.gov.uk/ripa/encryption/types-of-

encryption/ http://www.itworld.com/nl/unix_sec/01242002/ http://www.pcmag.com/encyclopedia_term/

0,2542,t=encryption+algorithm&i=42595,00.asp

More on vendors and more detailed products… http://securitypark.bitpipe.com/olist/Data-Encryption.html

Page 14: ENCRYPTION PPT PRESENTATION.ppt

Questions???