SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
How Encryption For Strong Security
              Works
●   Pseudoramdom Noise
●   Data Encryption
●   Link Encryption
●   VPN

                           s1170132 Manamu Abe
                         s1170133 Keigo Amma
                       s1170144 Ryo Kanno
                      s1170145 Masataka Kubota
Pseudoramdom Noise
●   In cryptography,
    pseudorandom noise
    (PRN) is signal similar
    to noise which satisfies
    one or more of the
    standard test for
    statistical randomness.
Data Encryption
●   Data encryption
    is a process in
    which plaintext
    data is
    converted into
    ciphertext so
    that it cannot be
    read.
Link Encryption
●   Link encryption is the
    data security process
    of encrypting
    information at the
    data link level as it is
    transmitted between
    two points within a
    network.
VPN
●VPN(Virtual Private
Network) is service to
connect data
communications
between systems.

●
  We can use public
lines like common
carrier leased lines with
VPN
REFERENCE
 Pseuderandom                     Noise
 http://dimtel.com/_media/support/notes/tek00012.png?w=&h=&cache=cache
 http://en.wikipedia.org/wiki/Pseudorandom_noise


 Data      Encryption
 http://www.wisegeek.com/what-is-data-encryption.htm
 http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/network.111/b28530/asotrans.htm


 Link     Encryption
 http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci526309,00.html
 http://www.palowireless.com/bluearticles/cc1_security1.asp


 VPN
 http://en.wikipedia.org/wiki/Vpn
  http://computer.howstuffworks.com/enlarge-image.htm?terms=vpn+-phantom&page=0

Más contenido relacionado

La actualidad más candente

Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Muhammad Farooq Hussain
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)Hemal Joshi
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffersWanwen Wen
 

La actualidad más candente (15)

Poster-A4
Poster-A4Poster-A4
Poster-A4
 
Cryptography
Cryptography Cryptography
Cryptography
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Superhelt 2013-screen
Superhelt 2013-screenSuperhelt 2013-screen
Superhelt 2013-screen
 
Cryptography
CryptographyCryptography
Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Kadai
KadaiKadai
Kadai
 
Man in the middle attack (mitm)
Man in the middle attack (mitm)Man in the middle attack (mitm)
Man in the middle attack (mitm)
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Encrytion ppt
Encrytion pptEncrytion ppt
Encrytion ppt
 
Ss
SsSs
Ss
 

Destacado (20)

Yacht charters
Yacht chartersYacht charters
Yacht charters
 
Ssiivu1
Ssiivu1Ssiivu1
Ssiivu1
 
Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009Caloosa Tech Times - November 2009
Caloosa Tech Times - November 2009
 
Accenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_reportAccenture 2009 global_consumer_satisfaction_report
Accenture 2009 global_consumer_satisfaction_report
 
竺宇峰
竺宇峰竺宇峰
竺宇峰
 
Magico
MagicoMagico
Magico
 
SheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption InfographicSheSpeaks Women Online Video Consumption Infographic
SheSpeaks Women Online Video Consumption Infographic
 
Savethedate3
Savethedate3Savethedate3
Savethedate3
 
Earth Science Jeopardy
Earth Science JeopardyEarth Science Jeopardy
Earth Science Jeopardy
 
Jupiterimages Catalog
Jupiterimages CatalogJupiterimages Catalog
Jupiterimages Catalog
 
Karina
KarinaKarina
Karina
 
Atlanta Briefing Part 1
Atlanta Briefing Part 1Atlanta Briefing Part 1
Atlanta Briefing Part 1
 
Nupmonitor tbv PMO 3 December 2009
Nupmonitor tbv PMO 3 December 2009Nupmonitor tbv PMO 3 December 2009
Nupmonitor tbv PMO 3 December 2009
 
Good Advice
Good AdviceGood Advice
Good Advice
 
International Trade And Business
International Trade And BusinessInternational Trade And Business
International Trade And Business
 
Lizeth And Jenny`S Project
Lizeth And Jenny`S ProjectLizeth And Jenny`S Project
Lizeth And Jenny`S Project
 
MANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORASMANTENIMIENTO DE COMPUTADORAS
MANTENIMIENTO DE COMPUTADORAS
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Learningapps2
Learningapps2Learningapps2
Learningapps2
 
1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health 1st Annual UNH Peeps Show! Peep Your Way to Health
1st Annual UNH Peeps Show! Peep Your Way to Health
 

Similar a Gps4b

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Workss1170087
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Worksguestf50fcba
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13I M
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13s116num
 
Week13presen
Week13presenWeek13presen
Week13presens1160131
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 

Similar a Gps4b (20)

How Encryption for Strong Security Works
How Encryption for Strong Security WorksHow Encryption for Strong Security Works
How Encryption for Strong Security Works
 
How Encryption For Strong Security Works
How Encryption For Strong Security WorksHow Encryption For Strong Security Works
How Encryption For Strong Security Works
 
Security F
Security FSecurity F
Security F
 
Group3
Group3Group3
Group3
 
Gwp Week13
Gwp Week13Gwp Week13
Gwp Week13
 
Web Presentation 13
Web Presentation 13Web Presentation 13
Web Presentation 13
 
Week13presen
Week13presenWeek13presen
Week13presen
 
Ga13
Ga13Ga13
Ga13
 
Week13
Week13Week13
Week13
 
English2
English2English2
English2
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Vpn
Vpn Vpn
Vpn
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
Week13
Week13Week13
Week13
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
What Makes A Good Vpn
What Makes A Good VpnWhat Makes A Good Vpn
What Makes A Good Vpn
 

Más de tykl94

Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)tykl94
 
Thesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationThesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationtykl94
 
Complete document design exercise #2
Complete document design exercise #2Complete document design exercise #2
Complete document design exercise #2tykl94
 
Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2tykl94
 
Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1tykl94
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3tykl94
 
Submit In-Class Presentation #1
Submit In-Class Presentation #1Submit In-Class Presentation #1
Submit In-Class Presentation #1tykl94
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5tykl94
 
Individual sections development exercise #4
Individual sections development exercise #4Individual sections development exercise #4
Individual sections development exercise #4tykl94
 
Individual sections development exercise #3
Individual sections development exercise #3Individual sections development exercise #3
Individual sections development exercise #3tykl94
 
Individual sections development exercise #2
Individual sections development exercise #2Individual sections development exercise #2
Individual sections development exercise #2tykl94
 
Individual sections development exercise #1
Individual sections development exercise #1Individual sections development exercise #1
Individual sections development exercise #1tykl94
 
Complete document design exercise #4
Complete document design exercise #4Complete document design exercise #4
Complete document design exercise #4tykl94
 
Complete document design exercise #3
Complete document design exercise #3Complete document design exercise #3
Complete document design exercise #3tykl94
 
Complete document design exercise #1
Complete document design exercise #1Complete document design exercise #1
Complete document design exercise #1tykl94
 
Week7 1m
Week7 1mWeek7 1m
Week7 1mtykl94
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2tykl94
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2tykl94
 
Week6 Cmap1
Week6 Cmap1Week6 Cmap1
Week6 Cmap1tykl94
 
Week5 Assignment
Week5 AssignmentWeek5 Assignment
Week5 Assignmenttykl94
 

Más de tykl94 (20)

Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)Thesis writing assignment; thesis presentation(fixed)
Thesis writing assignment; thesis presentation(fixed)
 
Thesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentationThesis writing assignment; thesis presentation
Thesis writing assignment; thesis presentation
 
Complete document design exercise #2
Complete document design exercise #2Complete document design exercise #2
Complete document design exercise #2
 
Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2Submit In-Class Presentation #4-2
Submit In-Class Presentation #4-2
 
Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1Submit In-Class Presentation #4-1
Submit In-Class Presentation #4-1
 
Submit In-Class Presentation #3
Submit In-Class Presentation #3Submit In-Class Presentation #3
Submit In-Class Presentation #3
 
Submit In-Class Presentation #1
Submit In-Class Presentation #1Submit In-Class Presentation #1
Submit In-Class Presentation #1
 
Individual sections development exercise #5
Individual sections development exercise #5Individual sections development exercise #5
Individual sections development exercise #5
 
Individual sections development exercise #4
Individual sections development exercise #4Individual sections development exercise #4
Individual sections development exercise #4
 
Individual sections development exercise #3
Individual sections development exercise #3Individual sections development exercise #3
Individual sections development exercise #3
 
Individual sections development exercise #2
Individual sections development exercise #2Individual sections development exercise #2
Individual sections development exercise #2
 
Individual sections development exercise #1
Individual sections development exercise #1Individual sections development exercise #1
Individual sections development exercise #1
 
Complete document design exercise #4
Complete document design exercise #4Complete document design exercise #4
Complete document design exercise #4
 
Complete document design exercise #3
Complete document design exercise #3Complete document design exercise #3
Complete document design exercise #3
 
Complete document design exercise #1
Complete document design exercise #1Complete document design exercise #1
Complete document design exercise #1
 
Week7 1m
Week7 1mWeek7 1m
Week7 1m
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2
 
Week6 Cmap2
Week6 Cmap2Week6 Cmap2
Week6 Cmap2
 
Week6 Cmap1
Week6 Cmap1Week6 Cmap1
Week6 Cmap1
 
Week5 Assignment
Week5 AssignmentWeek5 Assignment
Week5 Assignment
 

Último

UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 

Último (20)

UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 

Gps4b

  • 1. How Encryption For Strong Security Works ● Pseudoramdom Noise ● Data Encryption ● Link Encryption ● VPN s1170132 Manamu Abe s1170133 Keigo Amma s1170144 Ryo Kanno s1170145 Masataka Kubota
  • 2. Pseudoramdom Noise ● In cryptography, pseudorandom noise (PRN) is signal similar to noise which satisfies one or more of the standard test for statistical randomness.
  • 3. Data Encryption ● Data encryption is a process in which plaintext data is converted into ciphertext so that it cannot be read.
  • 4. Link Encryption ● Link encryption is the data security process of encrypting information at the data link level as it is transmitted between two points within a network.
  • 5. VPN ●VPN(Virtual Private Network) is service to connect data communications between systems. ● We can use public lines like common carrier leased lines with VPN
  • 6. REFERENCE  Pseuderandom Noise http://dimtel.com/_media/support/notes/tek00012.png?w=&h=&cache=cache http://en.wikipedia.org/wiki/Pseudorandom_noise  Data Encryption http://www.wisegeek.com/what-is-data-encryption.htm http://www.filibeto.org/sun/lib/nonsun/oracle/11.1.0.6.0/B28359_01/network.111/b28530/asotrans.htm  Link Encryption http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci526309,00.html http://www.palowireless.com/bluearticles/cc1_security1.asp  VPN http://en.wikipedia.org/wiki/Vpn http://computer.howstuffworks.com/enlarge-image.htm?terms=vpn+-phantom&page=0