Copyright

Ch 3: Network Encryption

About This Chapter

Studying for a test or completing an assignment or project that covers network encryption is simple with help from the fun lessons in this self-paced chapter. Use the lessons to quickly boost your knowledge, and take short quizzes and a chapter exam to check your understanding.

Network Encryption - Chapter Summary

If you need help grasping the basics of network encryption, you've reached the right place! This chapter offers a comprehensive overview of cryptography, basic encryption methods, symmetric encryption, IPsec vs. SSL and much more. Our instructors present this chapter's lessons in an easy-to-understand manner that makes studying these topics simple. Paired with each lesson is a mini quiz designed to confirm your knowledge of key concepts. The Dashboard tracks your progress through this chapter and lets you submit any questions you have about the lessons to our experts. Once you've completed this chapter, you will be able to:

  • Outline the history of encryption
  • Define the Advanced Encryption Standard (AES) and Data Encryption Standard (DES)
  • Share an example of the RSA algorithm
  • Exhibit knowledge of HTTPS encryption
  • Differentiate between WPA and WPA2 encryption
  • Explain differences between WPA and WEP encryption
  • Discuss the meaning of public key encryption

12 Lessons in Chapter 3: Network Encryption
Test your knowledge with a 30-question chapter practice test
What is Cryptography? - Definition & Uses

1. What is Cryptography? - Definition & Uses

In this lesson, we will examine the interesting world of cryptography. Securing our data and systems from malicious intruders, system glitches, and human errors have become paramount in modern systems.

The History of Encryption

2. The History of Encryption

Did you know that modern data encryption has roots that can be traced back almost 4,000 years? Encryption works equally well for military secrets and trade secrets as it does for love notes.

Basic Encryption Methods

3. Basic Encryption Methods

Now more than ever, encryption has become central to security and privacy, helping protect the data of individuals and corporations alike. In this lesson, we'll learn what exactly encryption is, basic encryption methods and the qualities of strong encryption.

What is Advanced Encryption Standard (AES)? - Definition & Overview

4. What is Advanced Encryption Standard (AES)? - Definition & Overview

In this lesson, we'll take a look at the Advanced Encryption Standard (AES), its purpose, its basic characteristics, and its strength. At the end of this lesson, you should have a good understanding of the fundamentals of this technology.

What is The Data Encryption Standard (DES)?

5. What is The Data Encryption Standard (DES)?

The Data Encryption Standard (DES) is a pioneering encryption algorithm that helped revolutionize encryption. In this lesson, we'll come to understand the current and historic significance of the Data Encryption Standard, and look at two basic encryption methods.

Symmetric Encryption: Definition & Example

6. Symmetric Encryption: Definition & Example

This lesson will cover symmetric encryption, a well-known standard for data encryption. It is a shared-key methodology, meaning the key used to encrypt the data is the same key used to decrypt it. Data Encryption Standard (DES) is also explained.

RSA Algorithm: Encryption & Example

7. RSA Algorithm: Encryption & Example

With the ever increasing instances of Internet-based commerce, it makes sense that protecting those transactions will become more and more important. In this lesson, we'll take a look at a commonly used algorithm, RSA, how it works, and where it is used.

IPsec vs. SSL

8. IPsec vs. SSL

This lesson will cover two encryption methods used to secure data: IPSec and SSL. These methods are mainly used to allow connections to secure networks from otherwise insecure sources.

HTTPS Encryption

9. HTTPS Encryption

With the rise of the Internet, it makes sense that there would be those out there that want to take advantage. Some at the expense of others. In this lesson, we'll take a look at a technology that is helping to keep us safe - HTTPS.

WPA vs. WPA2 Encryption

10. WPA vs. WPA2 Encryption

Explore how your router is protected from prying eyes and the hands of hackers. WPA and WPA2 are both methods to implement to block unsanctioned visitors from accessing your computer. Let's investigate their differences.

WPA vs. WEP Encryption

11. WPA vs. WEP Encryption

Explore how to protect your router and keep unauthorized attackers from gaining access to your internet and Wi-Fi with encryption methods WEP and WPA.

Public Key Encryption: Definition & Example

12. Public Key Encryption: Definition & Example

Protecting information transfers and e-commerce transactions is of vital importance these days. And with the ever-increasing number, that is sure to continue. In this lesson, we'll take a look at commonly use method, public key encryption, and how it works.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support