Page 4,446«..1020..4,4454,4464,4474,448..4,4604,470..»

This is how you can get access to cheap cloud storage for life – Business Insider Australia

Whether youre archiving old photos or securing some personal files, cloud storage is a handy way to preserve your precious data, and when it comes to cloud storage solutions, few give you as much bang for your buck as Zoolz. Offering a massive 2TB of storage space to the table, Zoolz Dual Cloud Storage nets you some serious space without breaking the bank.

Zoolz gives you access to 1TB of instant cloud storage and 1TB of cold storage for life. Use the instant storage to keep the files you access most often readily on hand, and tap into your cold storage when youre saving files you dont plan on using soon. Both options are secured with military-grade 256-AES encryption, so you can rest easy knowing your personal files are safe from prying eyes or anyone else interested in stealing your data.

Now, you can pick up Zoolz Dual Cloud Storage for only $131 AUD [$99 USD] thats more than 90% off its usual $9,450 AUD retail price!

Please note that all deals in the deal store are in US dollars. Additional shipping costs may apply for physical items.

Get this deal

Insider Picks are independent of Allure Medias editorial and advertising teams. Click here to learn more.

Follow Business Insider Australia on Facebook, Twitter, LinkedIn, and Instagram.

Read the original post:
This is how you can get access to cheap cloud storage for life - Business Insider Australia

Read More..

Miscue Calls Attention to Amazon’s Dominance in Cloud Computing – New York Times


New York Times
Miscue Calls Attention to Amazon's Dominance in Cloud Computing
New York Times
While would-be competitors snoozed, the internet retailer tiptoed into the business technology market over the past decade, becoming the dominant force in cloud computing. Its computing business, Amazon Web Services, hauled in $12.2 billion in revenue ...
Will Big-money Financial Services Cos Lead the Next Cloud Computing Wave?1redDrop (blog)

all 5 news articles »

Read more:
Miscue Calls Attention to Amazon's Dominance in Cloud Computing - New York Times

Read More..

A Step Further to Shared Economy: Onething Technologies … – Yahoo Finance

AUSTIN, Texas, March 12, 2017 /PRNewswire/ -- Internet solutions developer Onething Technologies demonstrated its innovational breakthrough of combining shared economy and cloud computing to effectively solve the future computing needs at South By Southwest (SXSW), the annual worldwide conglomerate of the most innovative people from music, film, and technology, on March. 11 in Austin, Texas.

Chen Lei, CEO of Onething Technologies and co-CEO of Xunlei, at his keynote speech "Reinventing Cloud Computing based on Shared Economy", said Onething Technologies builds a unique cloud computing platform based on shared economy to redefine the industry and create numerous economic and social value together with individual users.

Chen noted that corporations nowadays require more computational power as the rapidly changing development in areas such as gene sequencing and artificial intelligence results in exponential growth and demand for data computation, storage and transmission. With Moores Law diminishes in its effect, the demand of driving down cost of computation goes higher.

Unlike traditional cloud computing that requires centralized data centers, the company's platform, which consists of Xunlei Minecrafter and Nebula CDN, distributes internet users' redundant computational power and bandwidth to internet enterprises that have a huge demand for these aspects.

By utilizing spare resources under this context, Onething Technologies' solution enables tens of thousands of individual internet users to be contributors of computational power and bandwidth by sharing their personal smart devices.

The solution also saves companies' money by providing more advanced CDN technologies at a much lower cost. Efficient utilization of idle resources has significant social benefits as it saved around 32 million kilowatts per hour of electricity by December, 2016 and reduces carbon dioxide emission by about 26,800 ton compared to traditional cloud computing that use data centers.

The integration of shared economy is seen as a major boost in global cloud computing development. This innovational model has driven wide attention at the conference and was reported by Kvue News that it will bring more possibilities to the world.

"Our services have been used in livestream, VR, and TV, and our customers include top-rated internet companies," said Chen, "As our technology develops, we expect to expand our services into more areas such as artificial intelligence, massive data storage and big data analysis."

About Onething Technologies

Founded in 2013, Shenzhen Onething Technologies Co., Ltd is committed to providing technical resources for global internet development. The company combines Nebula CDN and Xunlei MineCrafter through innovative technology, building the first domestic millions of magnitude node of "infinite node type content delivery network". Onething not only redefines the CDN industry and Internet content transmission, but also heralds shared economic cloud computing era.

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/a-step-further-to-shared-economy-onething-technologies-presents-innovative-cloud-computing-at-sxsw-2017-300422324.html

Read this article:
A Step Further to Shared Economy: Onething Technologies ... - Yahoo Finance

Read More..

AI And Community Development Are Two Key Reasons Why Google May Win The Cloud Wars – Forbes


Forbes
AI And Community Development Are Two Key Reasons Why Google May Win The Cloud Wars
Forbes
Reflecting the rapidly increasing interest and investment in cloud computing, 10,000 developers, engineers, IT executives, and Google employees and partners gathered at Next '17, Google's annual cloud event for enterprise customers. Google showcased ...
Google Joins Chorus of Cloud Companies Promising to Democratize AIeWeek

all 7 news articles »

View original post here:
AI And Community Development Are Two Key Reasons Why Google May Win The Cloud Wars - Forbes

Read More..

FCC Investigates AT&T Wireless 911 Outage – eWeek

DAILY VIDEO: FCC seeking answers about AT&T's wireless 911 outage on March 8; Microsoft says it Will use ARM chips in new cloud servers; Microsoft previews developer-friendlier Visual Studio Team Services; and there's more.

DAILY BRIEFING: CA's Veracode deal not a sign of DevOps consolidation, analyst argues; Microsoft...

DAILY VIDEO: CA Technologies acquires Veracode for $614M to enable secure DevOps; IBM Watson,...

DAILY VIDEO: IBM expands quantum computing efforts; Researchers find 132 malware-infected...

DAILY VIDEO: Google volunteer team patches thousands of open-source projects; Google makes progress...

DAILY VIDEO: Yahoo CEO Mayer Will Forgo Bonuses Due to Security Lapses; AWS Outage Demonstrates Need...

DAILY VIDEO: More mobile carriers, manufacturers commit to Google RCS Messaging app; Red Hat updates...

DAILY VIDEO: Service Interruption Hits AWS's S3 Facility in Northern Virginia; SpaceX Targets 2018...

DAILY VIDEO: SAP goes all in with new public cloud platform, iOS dev tools; Amazon, Lenovo Motorola...

DAILY VIDEO: Apple trying to permanently resolve iPhone 6 and 7 battery faults; Researchers from...

DAILY VIDEO: Apple's futuristic new HQ Set to open doors in April; UPS tests delivery trucks equipped...

Read more about the stories in today's news:

Todays topics include the Federal Communications Commissions demand for an investigation on AT&Ts 911 outage on March 8, Microsofts announcement it will use ARM chips in new cloud servers, Microsofts developer friendly Visual Studio Team Services and TidalScales new server offering 'Inverse Virtualization.'

The FCC is investigating an AT&T 911 service outage which affected wireless customers across wide areas of the United States for several hours on March 8.

AT&T confirmed the 911 outage for some wireless customers in an email reply to an inquiry from eWEEK, but did not release full details of what happened, how many customers or what areas of the country were affected by the outage.

FCC Chairman Ajit Pai has directed his staff to find out what caused the 911 service outage for AT&T wireless customers and provide a full report. A story by The New York Times reported that the service outage affected AT&T customers in at least 14 states and Washington, D.C.

Microsoft said March 8 that for the first time, it has decided to start using chips based on ARM Holdings designs in the hundreds of thousands of servers that run its cloud services.

This isn't exactly welcome news for Intel, Microsofts longtime partner and a leader in the data-center processors market. Because ARM processors use less power than Intel's, Microsoft is seeking to cut costs in its fast-growing Azure cloud business.

Microsoft has more than 100 data centers in 38 regions around the world where it could use the new cloud servers, which are based on a design called Project Olympus and powered by ARM-based chips.

Microsoft previewed some of the upcoming features coming to Visual Studio Team Services, its cloud-based source code management offering.

Visual Studio 2017 reached the long-anticipated general availability milestone March 7, along with the first major update for Visual Studio Team Foundation Server 2017.

Microsoft is also teasing some of the features coming up in Visual Studio Team Services, the cloud-based component formally known as Visual Studio Online.

Among the new features that Microsoft has in the works for team services are conditional tasks, multi-phase builds and shared variables, according to corporate vice president Brian Harry.

A little-known startup called TidalScale may well have come up with the biggest advance in servers since VMware's virtualization of the Intel IA-32 platform 18 years ago. TidalScale is doing something it calls "inverse virtualization."

Instead of taking a standard server and slicing it up into smaller pieces for individual applications, TidalScale aggregates computing power from various commodity-type boxes from within a system and corrals it all into a single computing ocean of DRAM computing power. TidalScale already has several units in daily production whose owners say it works very well.

Read more here:
FCC Investigates AT&T Wireless 911 Outage - eWeek

Read More..

2017’s Best "Cloud Hosting" Providers | 100% Real Reviews

The late Steve Jobs once said, I dont need a hard disk in my computer if I can get to the server faster. The year was 1997, the Internet itself was only in its infancy, and here was the Apple Co-Founder and longtime web industry leader talking about our future in the Cloud.

That term and this idea of storing and hosting data on a connected network of virtual machines rather than hard disks has grown in popularity since, just as Steve predicted: Carrying around these non-connected computers is byzantine by comparison. Here we cover all the questions one could possibly have about the concept of cloud server hosting from the cloud infrastructure to the cost and features to look for and beyond.

Alright, so first: What is a cloud server, and how does it differ from your run-of-the-mill physical servers?

Cloud servers are just virtual machines (VMs) that run on whats called a cloud computing environment. Rather than having a physical hardware server, which is susceptible to hardware fail, cloud-hosted servers communicate over a network of connected servers theyre all online, but none of your data is stored on your hard drive. Cloud-based servers are software-independent, making them a highly available alternative to on-premise servers, especially if youre in need of resources on demand.

Your cloud host is just the service provider connecting you to this software-independent server network.

The Cloud is known for giving us the ability to send, store, and retrieve data in massive quantities, from anywhere in the world, at any given point in time. As such, there are several benefits of cloud hosting, but like anything else, those perks come at a cost.

Now, for the downsides: Most of these disadvantages can be offset by strategic use of public and private cloud environments (more on this further down).

To quote Steve again, Managing a network like this is a pain in the butt, but for those in need of on-demand resources only when you need them and always where you are this can be a solution with an awesome cost-to-stability ratio.

Its important to realize that there are several cloud-based services out there apart from web hosting services. Backing up your files online (e.g., Dropbox, Google Cloud, etc.), web applications, and other as-a-Service offerings (SaaS, Paas, IaaS) make up what we call cloud computing. In short, cloud computing just means a bunch of computers are sharing processing power and data with multiple devices.

Cloud service providers are not necessarily the same as your cloud hosts, like the folks listed on this page. This can seem convoluted at first because those computing jobs are done on cloud server networks, but think of it this way: You can can sign up for many various Internet-based resources and not have a website hosted on a server in the Cloud. Just because you need cloud-based storage, for example, doesnt mean you are shopping for cloud hosting. Get it?

To recap, cloud computing providers might offer any or many of the following:

There are plenty other specific examples of services, but the ones listed above are some of the more well-known representations of the as-a-Service models of cloud computing. Much like the web hosting end of things, the benefits of cloud computing include fast access to tons of data whenever, wherever.

Yes much like web hosting services can be broken down into shared, vps, and dedicated options, the Cloud is divided: public and private. Here, well also get into whats called hybrid hosting and how cloud hosting fits in with its commonly confused sidekick, VPS hosting.

The main difference between the public and private cloud sectors is the latter means the hardware, storage, and network are all allotted to a single tenant one client or company. In contrast, a multi-tenant environment, or the public cloud, means that you can buy a slice of a cloud computing environment and share space with other customers.

The Google Cloud platform, Amazon EC2, and Rackspace are all examples of public clouds and the perks include pay-as-you-go pricing, getting to set up and manage your own servers, and no contracts. Private clouds, on the other hand, offer the advantages of PCI/HIPAA compliance, high-level security, and hardware customization. You can also breed hybrid deployments via the private cloud, which cant be done in the public cloud.

Put simply, hybrid hosting is using a mix of public and private hosting environments i.e., ideal for those who want to harness the security of the private cloud while capitalizing on the economical benefits of public cloud resources.

For more on this, check out our guide to getting started with hybrid hosting.

Finally, virtual private server (VPS) hosting versus virtual machine (cloud) hosting know the difference. While a VPS is a physical server thats been partitioned into multiple hardware slices each acting as independent server environments, a cloud server is running on a network of connected machines. A VPS is still subject to hardware failure, whereas a cloud web server will just transfer data to another machine without the owner experiencing downtime or data loss.

To be clear: A VPS can be hosted in the Cloud, making it a cloud VPS, but not all cloud servers are VPSs. To see the top VPS hosting plans, including many leading cloud options, check out our VPS reviews.

The best cloud hosting providers are going to help you capitalize on all the advantages of cloud hosting instant provisioning; scalable, on-demand resources; and flexible hardware options for a reasonable cost.

Some of the top features we look for in determining the best hosting services for cloud customers:

When it comes to premiere customer support, SSD speed boosting, and managed servers, InMotion is particularly great at all of the above.

You can pay anywhere from $15 to more than $50 a month on a reputable cloud hosts server.

Lets review: With hosts like InMotion or Bluehost, youre getting immediate provisioning and deployment of super scalable cloud resources, a bunch of processing power, and industry-leading expert support in the pricing ballpark of $15 a month. This is as cheap (and as highly valued) as cheap cloud hosting gets, folks. You get your moneys worth.

Yes, free cloud hosting is a thing, but it mostly comes in the form of a free trial. You have to sign up with a credit card, you get a taste of the awesome resources for 60 days or so, and then you have to pay for anything you use thereafter.

I cant communicate to you how awesome this is unless you use it final words from Steve, and truer words could not have been said of cloud platforms. For those whose businesses need highly available, on-demand cloud computing power, those who cant afford hardware failure, and those who like the idea of paying for a service by the hour, the Cloud is awesome. Whats more, the top cloud hosts can have you launched and live in minutes may the force of the Cloud be with you.

See original here:
2017's Best "Cloud Hosting" Providers | 100% Real Reviews

Read More..

Cloud Site Hosting by Apache Website Hosting

To ensure the best possible experience for your website visitors, you need to find the optimal location for your websites. Having taken this into consideration, we offer data centers on three different continents. This permits you to select the location thats closest to your target visitors so that you can offer them the best loading speeds.

If your clients are physically located in the United States, you can pick our US Based Cloud Hosting option our Chicago data center facility. If you will target clients from England or Europe, then select our UK Based Cloud Hosting option our data center outside London is what you need. If you plan to popularize your brand on the Russian market or maybe on the markets in Northern Europe, check out our data center in Finland. should your site visitors come from Eastern Europe, take a look at our Eastern Europe data center in Sofia, Bulgaria. And if your customers live in Australia or Asia, then try out our AU Based Cloud Hosting services in our Sydney data center.

Whichever facility you pick, youll be given a 99.9% uptime guarantee with all our cloud web hosting plans.

See the rest here:
Cloud Site Hosting by Apache Website Hosting

Read More..

Internet security – Wikipedia

Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole. Its objective is to establish rules and measures to use against attacks over the Internet.[1] The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.[2] Different methods have been used to protect the transfer of data, including encryption and from-the-ground-up engineering.[3]

A computer user can be tricked or forced into downloading software onto a computer that is of malicious intent. Such software comes in many forms, such as viruses, Trojan horses, spyware, and worms.

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. According to businesses who participated in an international business security survey, 25% of respondents experienced a DoS attack in 2007 and 16.8% experienced one in 2010.[4]

Phishing occurs when the attacker pretends to be a trustworthy entity, either via email or web page. Victims are directed to fake web pages, which are dressed to look legitimate, via spoof emails, instant messenger/social media or other avenues. Often tactics such as email spoofing are used to make emails appear to be from legitimate senders, or long complex subdomains hide the real website host.[5][6] Insurance group RSA said that phishing accounted for worldwide losses of $1.5 billion in 2012.[7]

Applications used to access Internet resources may contain security vulnerabilities such as memory safety bugs or flawed authentication checks. The most severe of these bugs can give network attackers full control over the computer. Most security applications and suites are incapable of adequate defense against these kinds of attacks.[8]

TCP/IP protocols may be secured with cryptographic methods and security protocols. These protocols include Secure Sockets Layer (SSL), succeeded by Transport Layer Security (TLS) for web traffic, Pretty Good Privacy (PGP) for email, and IPsec for the network layer security.

IPsec is designed to protect TCP/IP communication in a secure manner. It is a set of security extensions developed by the Internet Task Force (IETF). It provides security and authentication at the IP layer by transforming data using encryption. Two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and ESP. These two protocols provide data integrity, data origin authentication, and anti-replay service. These protocols can be used alone or in combination to provide the desired set of security services for the Internet Protocol (IP) layer.

The basic components of the IPsec security architecture are described in terms of the following functionalities:

The set of security services provided at the IP layer includes access control, data origin integrity, protection against replays, and confidentiality. The algorithm allows these sets to work independently without affecting other parts of the implementation. The IPsec implementation is operated in a host or security gateway environment giving protection to IP traffic.

Some online sites offer customers the ability to use a six-digit code which randomly changes every 3060 seconds on a security token. The keys on the security token have built in mathematical computations and manipulate numbers based on the current time built into the device. This means that every thirty seconds there is only a certain array of numbers possible which would be correct to validate access to the online account. The website that the user is logging into would be made aware of that devices' serial number and would know the computation and correct time built into the device to verify that the number given is indeed one of the handful of six-digit numbers that works in that given 30-60 second cycle. After 3060 seconds the device will present a new random six-digit number which can log into the website.[9]

Email messages are composed, delivered, and stored in a multiple step process, which starts with the message's composition. When the user finishes composing the message and sends it, the message is transformed into a standard format: an RFC 2822 formatted message. Afterwards, the message can be transmitted. Using a network connection, the mail client, referred to as a mail user agent (MUA), connects to a mail transfer agent (MTA) operating on the mail server. The mail client then provides the senders identity to the server. Next, using the mail server commands, the client sends the recipient list to the mail server. The client then supplies the message. Once the mail server receives and processes the message, several events occur: recipient server identification, connection establishment, and message transmission. Using Domain Name System (DNS) services, the senders mail server determines the mail server(s) for the recipient(s). Then, the server opens up a connection(s) to the recipient mail server(s) and sends the message employing a process similar to that used by the originating client, delivering the message to the recipient(s).

Pretty Good Privacy provides confidentiality by encrypting messages to be transmitted or data files to be stored using an encryption algorithm such as Triple DES or CAST-128. Email messages can be protected by using cryptography in various ways, such as the following:

The first two methods, message signing and message body encryption, are often used together; however, encrypting the transmissions between mail servers is typically used only when two organizations want to protect emails regularly sent between each other. For example, the organizations could establish a virtual private network (VPN) to encrypt the communications between their mail servers over the Internet.[10] Unlike methods that can only encrypt a message body, a VPN can encrypt entire messages, including email header information such as senders, recipients, and subjects. In some cases, organizations may need to protect header information. However, a VPN solution alone cannot provide a message signing mechanism, nor can it provide protection for email messages along the entire route from sender to recipient.

MIME transforms non-ASCII data at the sender's site to Network Virtual Terminal (NVT) ASCII data and delivers it to client's Simple Mail Transfer Protocol (SMTP) to be sent through the Internet.[11] The server SMTP at the receiver's side receives the NVT ASCII data and delivers it to MIME to be transformed back to the original non-ASCII data.

A Message authentication code (MAC) is a cryptography method that uses a secret key to encrypt a message. This method outputs a MAC value that can be decrypted by the receiver, using the same secret key used by the sender. The Message Authentication Code protects both a message's data integrity as well as its authenticity.[12]

A computer firewall controls access between networks. It generally consists of gateways and filters which vary from one firewall to another. Firewalls also screen network traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server between SMTP and Hypertext Transfer Protocol (HTTP) connections.[13]

Firewalls impose restrictions on incoming and outgoing Network packets to and from private networks. Incoming or outgoing traffic must pass through the firewall; only authorized traffic is allowed to pass through it. Firewalls create checkpoints between an internal private network and the public Internet, also known as choke points (borrowed from the identical military term of a combat limiting geographical feature). Firewalls can create choke points based on IP source and TCP port number. They can also serve as the platform for IPsec. Using tunnel mode capability, firewall can be used to implement VPNs. Firewalls can also limit network exposure by hiding the internal network system and information from the public Internet.

A packet filter is a first generation firewall that processes network traffic on a packet-by-packet basis. Its main job is to filter traffic from a remote IP host, so a router is needed to connect the internal network to the Internet. The router is known as a screening router, which screens packets leaving and entering the network.

In a stateful firewall the circuit-level gateway is a proxy server that operates at the network level of an Open Systems Interconnection (OSI) model and statically defines what traffic will be allowed. Circuit proxies will forward Network packets (formatted unit of data ) containing a given port number, if the port is permitted by the algorithm. The main advantage of a proxy server is its ability to provide Network Address Translation (NAT), which can hide the user's IP address from the Internet, effectively protecting all internal information from the Internet.

An application-level firewall is a third generation firewall where a proxy server operates at the very top of the OSI model, the IP suite application level. A network packet is forwarded only if a connection is established using a known protocol. Application-level gateways are notable for analyzing entire messages rather than individual packets of data when the data are being sent or received.

Web browser statistics tend to affect the amount a Web browser is exploited. For example, Internet Explorer 6, which used to own a majority of the Web browser market share,[14] is considered extremely insecure[15] because vulnerabilities were exploited due to its former popularity. Since browser choice is more evenly distributed (Internet Explorer at 28.5%, Firefox at 18.4%, Google Chrome at 40.8%, and so on)[14] and vulnerabilities are exploited in many different browsers.[16][17][18]

Antivirus software and Internet security programs can protect a programmable device from attack by detecting and eliminating viruses; Antivirus software was mainly shareware in the early years of the Internet,[when?] but there are now[when?] several free security applications on the Internet to choose from for all platforms.[19]

A password manager is a software application that helps a user store and organize passwords. Password managers usually store passwords encrypted, requiring the user to create a master password; a single, ideally very strong password which grants the user access to their entire password database.[20]

So called security suites were first offered for sale in 2003 (McAfee) and contain a suite of firewalls, anti-virus, anti-spyware and more.[21] They also offer theft protection, portable storage device safety check, private Internet browsing, cloud anti-spam, a file shredder or make security-related decisions (answering popup windows) and several were free of charge[22].

Go here to see the original:
Internet security - Wikipedia

Read More..

Internet security company launches a perfume line to promote cybersecurity – Mashable


Mashable
Internet security company launches a perfume line to promote cybersecurity
Mashable
Kaspersky is a company that creates software to protect homes and businesses from viruses and internet threats and now they will also be making perfume. The company is partnered with Scarlett London, a well-known fashion and lifestyle blogger based in ...

Read this article:
Internet security company launches a perfume line to promote cybersecurity - Mashable

Read More..

Encryption – technet.microsoft.com

Traditionally, ciphers have used information contained in secret decoding keys to code and decode messages. The process of coding plaintext to create ciphertext is called encryption and the process of decoding ciphertext to produce the plaintext is called decryption. Modern systems of electronic cryptography use digital keys (bit strings) and mathematical algorithms ( encryption algorithms ) to encrypt and decrypt information.

There are two types of encryption: symmetric key encryption and public (asymmetric) key encryption. Symmetric key and public key encryption are used, often in conjunction, to provide a variety of security functions for network and information security.

Encryption algorithms that use the same key for encrypting and for decrypting information are called symmetric-key algorithms. The symmetric key is also called a secret key because it is kept as a shared secret between the sender and receiver of information. Otherwise, the confidentiality of the encrypted information is compromised. Figure14.1 shows basic symmetric key encryption and decryption.

Figure14.1 Encryption and Decryption with a Symmetric Key

Symmetric key encryption is much faster than public key encryption, often by 100 to 1,000 times. Because public key encryption places a much heavier computational load on computer processors than symmetric key encryption, symmetric key technology is generally used to provide secrecy for the bulk encryption and decryption of information.

Symmetric keys are commonly used by security protocols as session keys for confidential online communications. For example, the Transport Layer Security (TLS) and Internet Protocol security (IPSec) protocols use symmetric session keys with standard encryption algorithms to encrypt and decrypt confidential communications between parties. Different session keys are used for each confidential communication session and session keys are sometimes renewed at specified intervals.

Symmetric keys also are commonly used by technologies that provide bulk encryption of persistent data, such as e-mail messages and document files. For example, Secure/Multipurpose Internet Mail Extensions (S/MIME) uses symmetric keys to encrypt messages for confidential mail, and Encrypting File System (EFS) uses symmetric keys to encrypt files for confidentiality.

Cryptography-based security technologies use a variety of symmetric key encryption algorithms to provide confidentiality. For more information about the specific encryption algorithms that are used by security technologies, see the applicable documentation for each technology. For more information about how the various symmetric key algorithms differ, see the cryptography literature that is referenced under "Additional Resources" at the end of this chapter.

Encryption algorithms that use different keys for encrypting and decrypting information are most often called public-key algorithms but are sometimes also called asymmetric key algorithms . Public key encryption requires the use of both a private key (a key that is known only to its owner) and a public key (a key that is available to and known to other entities on the network). A user's public key, for example, can be published in the directory so that it is accessible to other people in the organization. The two keys are different but complementary in function. Information that is encrypted with the public key can be decrypted only with the corresponding private key of the set. Figure14.2 shows basic encryption and decryption with asymmetric keys.

Figure14.2 Encryption and Decryption with Asymmetric Keys

The RSA digital signature process also uses private keys to encrypt information to form digital signatures. For RSA digital signatures, only the public key can decrypt information encrypted by the corresponding private key of the set.

Today, public key encryption plays an increasingly important role in providing strong, scalable security on intranets and the Internet. Public key encryption is commonly used to perform the following functions:

Encrypt symmetric secret keys to protect the symmetric keys during exchange over the network or while being used, stored, or cached by operating systems.

Create digital signatures to provide authentication and nonrepudiation for online entities.

Create digital signatures to provide data integrity for electronic files and documents.

Follow this link:
Encryption - technet.microsoft.com

Read More..