answersLogoWhite

0

Encryption is to trasform the data into the coded form..like password or securty key n if u want to read dat then u must hv to access on dat coded key..

  1. it is also a network security process whch applies crypto service at n/w transfer layer..
  2. its a conversation of d data into the form of ciphetext..
  3. its widely used on wireless communication ...fr ex..credit card purchase online,,,disscusion of two company..etc etc..
User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

An attacker has managed to decode the encrypted messages of a wireless network the network uses windows xp and cisco equipment the security protocol that is used is wep with 64-bit encryption which?

You need to choose stronger encryption and longer encryption key.


When securing a Wi-fi wireless network which is considered better security to filter MAC addresses use encryption or not broadcast the SSID?

Using encryption is the best answer because it requires a security key.


What network conforms to the government security standards and uses more sophisticated encryption techniques?

wpa2


The network uses windows xp and cisco equipment the security protocol that is used is wep with 64-bit encryption which action can be recommended to the technician for securing the network?

Upgrade to the LEAP wireless security protocol.


How is broadband access different from the network you use at work?

Corporate and government networks are typically protected by many layers of security, ranging from network firewalls to encryption. In addition, they usually have support staff who maintain the security and availability of these network connections.


A tunnel through the Internet that uses encryption and other security measures to keep out unauthorized users?

Peer to peer network


An attacker has managed to decode the encrypted messages of a wireless network the network uses windows xp and cisco equipment the security protocol that is used is wep with 64-bit encryption?

Upgrade to the LEAP wireless security protocol.


How do you get into a security enabled network?

You have to use the same security settings for your wireless adapter that the network you are attempting to join is using. You need to configure the encryption type (WEP, WPA, WPA2, etc.), and the key in order to join the network. If you do not have this information, contact the network administrator. If this is a home network, contact the person who set it up.


If your laptop only supports WEP encryption but your wireless router has a WPA key are you able to use the laptop with the wireless?

If your computer only supports WEP encryption, but the wireless network uses WPA, you will not be able to connect to the network. However, most wireless networks can be configured to use WEP security or no security, which will allow you to connect. The trade-off is that the network becomes less secure. WEP encryption is possible to defeat, and turning off security will allow anyone connected to the network to view all data traffic, including private information. A better option may be to purchase a wireless adapter that supports WPA encryption. WPA was developed to fix the flaws of WEP, and is much stronger.


Does the AMA ethics opinion mention encryption as a technique for security?

. Does AMA ethics opinion mention encryption as a technique for security?


What are some types of security encryption software?

There is a lot of security encryption software about. It can be for your hard drive or just for your emails. The most popular cyphers are PGP, Blowfish and AES encryption.


What network security tools are useful when an audit is imminent in a small company?

The network security tools that you should have in place include firewalls, proxy servers, encryption, logical security and access controls, anti-virus software and log management tools. It is also vital to make sure that everything has been updated to the most current versions available ensure network security.