Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Encryption_Example v0.2

No description
by

Faham Usman

on 22 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Encryption_Example v0.2

Information Security
Encryption
Awareness Campaign
Agenda
Salim is your Cyber Security Advisor.
Aims at promoting, building and ensuring a safer & secure cyber environment and culture in the UAE.
About aeCERT
One of the initiatives of the UAE Telecommunications Regulatory Authority.
aeCERT is the United Arab Emirates Computer Emergency Response Team.
About aeCERT
Information Security
Encryption
Encryption Tools
How to Encrypt Your Documents
Data Leakage
Encryption Types
aeCERT
Salim (aeCERT)
@salim_aecert
For more information
www.aecert.ae
info@aecert.ae
Questions
Data Leakage
How to Encrypt Your Documents
Encryption Tools
Encryption Tools
Encryption Tools
Encryption Tools
Data Leakage Comparison
Encryption Tools

Encryption Tools
How to Encrypt Your Documents
There are two types of encryption.

Encryption Types
Steps to Protect Your Information
Decryption Scheme
03
02
01
The purpose of encryption is to make sure that the data being sent can only be read by the person having the right key to decrypt it.
Decryption is the process of converting secret message text to its original form (plain text), so it can be understood.
Encryption is a way of protecting your data by converting a plain text to a secret message text, that cannot be understood by unauthorized people
Encrypt your information
Steps to Protect Your Information
Risk
Encryption (Network)
Encryption (Laptop)
Encryption Scheme
Using encryption in wireless access point not only secures its transmission with the device but also
keeps unintended users from accessing it.

03
02
01
An insecure Wi-Fi network can be used by the attackers to gain sensitive personal and financia
l information.

Encryption (Wireless)
Encryption (Laptop)
Encryption (Wireless)
The attacker intercepts the encrypted packet and compares it with the original one allowing him to get encryption key

WEP Cracking
A laptop is stolen every 53 seconds. In the United States, 12,000 laptops are lost every week at airports.
Hack laptop logon
Boot laptop in admin mode
20,000 sensitive word documents related to
your work
1 Gigabyte USB can store:
An average USB stick can store over 32 Gigabyte.
Risk
Asymmetric Encryption
Encryption Types
Symmetric Encryption
Encryption Types

Document Encryption
Wireless Cracking
Country-wise Data Leakage
Encryption
Encryption
In an insecure Wi-Fi network, the transmission of data between devices (laptops, smart phones, tablets,
etc.) and the wireless access point is insecure.
Full transcript