About This Chapter
Network Encryption - Chapter Summary
If you need help grasping the basics of network encryption, you've reached the right place! This chapter offers a comprehensive overview of cryptography, basic encryption methods, symmetric encryption, IPsec vs. SSL and much more. Our instructors present this chapter's lessons in an easy-to-understand manner that makes studying these topics simple. Paired with each lesson is a mini quiz designed to confirm your knowledge of key concepts. The Dashboard tracks your progress through this chapter and lets you submit any questions you have about the lessons to our experts. Once you've completed this chapter, you will be able to:
- Outline the history of encryption
- Define the Advanced Encryption Standard (AES) and Data Encryption Standard (DES)
- Share an example of the RSA algorithm
- Exhibit knowledge of HTTPS encryption
- Differentiate between WPA and WPA2 encryption
- Explain differences between WPA and WEP encryption
- Discuss the meaning of public key encryption
1. What is Cryptography? - Definition & Uses
In this lesson, we will examine the interesting world of cryptography. Securing our data and systems from malicious intruders, system glitches, and human errors have become paramount in modern systems.
2. The History of Encryption
Did you know that modern data encryption has roots that can be traced back almost 4,000 years? Encryption works equally well for military secrets and trade secrets as it does for love notes.
3. Basic Encryption Methods
Now more than ever, encryption has become central to security and privacy, helping protect the data of individuals and corporations alike. In this lesson, we'll learn what exactly encryption is, basic encryption methods and the qualities of strong encryption.
4. What is Advanced Encryption Standard (AES)? - Definition & Overview
In this lesson, we'll take a look at the Advanced Encryption Standard (AES), its purpose, its basic characteristics, and its strength. At the end of this lesson, you should have a good understanding of the fundamentals of this technology.
5. What is The Data Encryption Standard (DES)?
The Data Encryption Standard (DES) is a pioneering encryption algorithm that helped revolutionize encryption. In this lesson, we'll come to understand the current and historic significance of the Data Encryption Standard, and look at two basic encryption methods.
6. Symmetric Encryption: Definition & Example
This lesson will cover symmetric encryption, a well-known standard for data encryption. It is a shared-key methodology, meaning the key used to encrypt the data is the same key used to decrypt it. Data Encryption Standard (DES) is also explained.
7. RSA Algorithm: Encryption & Example
With the ever increasing instances of Internet-based commerce, it makes sense that protecting those transactions will become more and more important. In this lesson, we'll take a look at a commonly used algorithm, RSA, how it works, and where it is used.
8. IPsec vs. SSL
This lesson will cover two encryption methods used to secure data: IPSec and SSL. These methods are mainly used to allow connections to secure networks from otherwise insecure sources.
9. HTTPS Encryption
With the rise of the Internet, it makes sense that there would be those out there that want to take advantage. Some at the expense of others. In this lesson, we'll take a look at a technology that is helping to keep us safe - HTTPS.
10. WPA vs. WPA2 Encryption
Explore how your router is protected from prying eyes and the hands of hackers. WPA and WPA2 are both methods to implement to block unsanctioned visitors from accessing your computer. Let's investigate their differences.
11. WPA vs. WEP Encryption
Explore how to protect your router and keep unauthorized attackers from gaining access to your internet and Wi-Fi with encryption methods WEP and WPA.
12. Public Key Encryption: Definition & Example
Protecting information transfers and e-commerce transactions is of vital importance these days. And with the ever-increasing number, that is sure to continue. In this lesson, we'll take a look at commonly use method, public key encryption, and how it works.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.