Ch 10: Network Encryption Overview

About This Chapter

If you need to study network encryption for an upcoming exam, class assignment or professional purpose, then this chapter can help you out. Inside, you'll find bite-sized lessons and quizzes that lay out the foundations of network encryption and its functions in computer networks.

Network Encryption Overview - Chapter Summary

This self-paced study guide chapter offers a thorough overview of network encryption topics in computer science. Follow along with our expert instructors to learn about several encryption methods, standards and protocols. You'll also see how these encryption methods compare and how they're broken. The chapter can be completed at your own pace, and we've included short quizzes to help you reinforce the information. Be sure to take the chapter exam, and don't hesitate to submit questions to our computer science instructors if you need any help with the material. Upon completion of the chapter, you should be equipped to:

  • Discuss methods of encryption
  • Define the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES)
  • Recognize examples of symmetric encryption and RSA algorithms
  • Describe the differences between SSL and IPsec
  • Outline the process of HTTPS encryption
  • Differentiate between WPA, WPA2 and WEP encryption
  • Compare types of VPN encryption protocols
  • Evaluate public key encryption and SSH proxy tunnels
  • Tell how encryption methods can be broken

12 Lessons in Chapter 10: Network Encryption Overview
Test your knowledge with a 30-question chapter practice test
Basic Encryption Methods

1. Basic Encryption Methods

Now more than ever, encryption has become central to security and privacy, helping protect the data of individuals and corporations alike. In this lesson, we'll learn what exactly encryption is, basic encryption methods and the qualities of strong encryption.

What is Advanced Encryption Standard (AES)? - Definition & Overview

2. What is Advanced Encryption Standard (AES)? - Definition & Overview

In this lesson, we'll take a look at the Advanced Encryption Standard (AES), its purpose, its basic characteristics, and its strength. At the end of this lesson, you should have a good understanding of the fundamentals of this technology.

What is The Data Encryption Standard (DES)?

3. What is The Data Encryption Standard (DES)?

The Data Encryption Standard (DES) is a pioneering encryption algorithm that helped revolutionize encryption. In this lesson, we'll come to understand the current and historic significance of the Data Encryption Standard, and look at two basic encryption methods.

Symmetric Encryption: Definition & Example

4. Symmetric Encryption: Definition & Example

This lesson will cover symmetric encryption, a well-known standard for data encryption. It is a shared-key methodology, meaning the key used to encrypt the data is the same key used to decrypt it. Data Encryption Standard (DES) is also explained.

RSA Algorithm: Encryption & Example

5. RSA Algorithm: Encryption & Example

With the ever increasing instances of Internet-based commerce, it makes sense that protecting those transactions will become more and more important. In this lesson, we'll take a look at a commonly used algorithm, RSA, how it works, and where it is used.

IPsec vs. SSL

6. IPsec vs. SSL

This lesson will cover two encryption methods used to secure data: IPSec and SSL. These methods are mainly used to allow connections to secure networks from otherwise insecure sources.

HTTPS Encryption

7. HTTPS Encryption

With the rise of the Internet, it makes sense that there would be those out there that want to take advantage. Some at the expense of others. In this lesson, we'll take a look at a technology that is helping to keep us safe - HTTPS.

WPA vs. WPA2 Encryption

8. WPA vs. WPA2 Encryption

Explore how your router is protected from prying eyes and the hands of hackers. WPA and WPA2 are both methods to implement to block unsanctioned visitors from accessing your computer. Let's investigate their differences.

WPA vs. WEP Encryption

9. WPA vs. WEP Encryption

Explore how to protect your router and keep unauthorized attackers from gaining access to your internet and Wi-Fi with encryption methods WEP and WPA.

VPN Encryption: Types & Protocols

10. VPN Encryption: Types & Protocols

VPN (Virtual Private Network) encryption is used to ensure secure communications over data networks. In this lesson, we'll look at some of the different protocols that make up a VPN and the types of encryption that are used within a VPN.

Public Key Encryption: Definition & Example

11. Public Key Encryption: Definition & Example

Protecting information transfers and e-commerce transactions is of vital importance these days. And with the ever-increasing number, that is sure to continue. In this lesson, we'll take a look at commonly use method, public key encryption, and how it works.

SSH Proxy Tunnels

12. SSH Proxy Tunnels

In this lesson, we will examine what proxy tunneling is all about and understand what SSH proxy tunneling is. We will examine the three main uses of SSH proxy tunnels.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support