About This Chapter
Network Encryption Overview - Chapter Summary
This self-paced study guide chapter offers a thorough overview of network encryption topics in computer science. Follow along with our expert instructors to learn about several encryption methods, standards and protocols. You'll also see how these encryption methods compare and how they're broken. The chapter can be completed at your own pace, and we've included short quizzes to help you reinforce the information. Be sure to take the chapter exam, and don't hesitate to submit questions to our computer science instructors if you need any help with the material. Upon completion of the chapter, you should be equipped to:
- Discuss methods of encryption
- Define the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES)
- Recognize examples of symmetric encryption and RSA algorithms
- Describe the differences between SSL and IPsec
- Outline the process of HTTPS encryption
- Differentiate between WPA, WPA2 and WEP encryption
- Compare types of VPN encryption protocols
- Evaluate public key encryption and SSH proxy tunnels
- Tell how encryption methods can be broken
1. Basic Encryption Methods
Now more than ever, encryption has become central to security and privacy, helping protect the data of individuals and corporations alike. In this lesson, we'll learn what exactly encryption is, basic encryption methods and the qualities of strong encryption.
2. What is Advanced Encryption Standard (AES)? - Definition & Overview
In this lesson, we'll take a look at the Advanced Encryption Standard (AES), its purpose, its basic characteristics, and its strength. At the end of this lesson, you should have a good understanding of the fundamentals of this technology.
3. What is The Data Encryption Standard (DES)?
The Data Encryption Standard (DES) is a pioneering encryption algorithm that helped revolutionize encryption. In this lesson, we'll come to understand the current and historic significance of the Data Encryption Standard, and look at two basic encryption methods.
4. Symmetric Encryption: Definition & Example
This lesson will cover symmetric encryption, a well-known standard for data encryption. It is a shared-key methodology, meaning the key used to encrypt the data is the same key used to decrypt it. Data Encryption Standard (DES) is also explained.
5. RSA Algorithm: Encryption & Example
With the ever increasing instances of Internet-based commerce, it makes sense that protecting those transactions will become more and more important. In this lesson, we'll take a look at a commonly used algorithm, RSA, how it works, and where it is used.
6. IPsec vs. SSL
This lesson will cover two encryption methods used to secure data: IPSec and SSL. These methods are mainly used to allow connections to secure networks from otherwise insecure sources.
7. HTTPS Encryption
With the rise of the Internet, it makes sense that there would be those out there that want to take advantage. Some at the expense of others. In this lesson, we'll take a look at a technology that is helping to keep us safe - HTTPS.
8. WPA vs. WPA2 Encryption
Explore how your router is protected from prying eyes and the hands of hackers. WPA and WPA2 are both methods to implement to block unsanctioned visitors from accessing your computer. Let's investigate their differences.
9. WPA vs. WEP Encryption
Explore how to protect your router and keep unauthorized attackers from gaining access to your internet and Wi-Fi with encryption methods WEP and WPA.
10. VPN Encryption: Types & Protocols
VPN (Virtual Private Network) encryption is used to ensure secure communications over data networks. In this lesson, we'll look at some of the different protocols that make up a VPN and the types of encryption that are used within a VPN.
11. Public Key Encryption: Definition & Example
Protecting information transfers and e-commerce transactions is of vital importance these days. And with the ever-increasing number, that is sure to continue. In this lesson, we'll take a look at commonly use method, public key encryption, and how it works.
12. SSH Proxy Tunnels
In this lesson, we will examine what proxy tunneling is all about and understand what SSH proxy tunneling is. We will examine the three main uses of SSH proxy tunnels.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 336: Network Forensics course
- Network Components
- Network Protocols Overview
- Network Security Fundamentals
- Network Threats & Digital Crimes
- Network Forensic Investigations
- Traffic Analysis in Network Forensics
- Detecting & Preventing Network Intrusions
- Email & Digital Forensics
- Virus & Malware Detection
- Incident Response in Network Forensics