1 00:00:00,640 --> 00:00:08,410 OK, now let's talk something about the encryption devices, although a number of the devices we have 2 00:00:08,410 --> 00:00:14,710 discussed earlier can perform encryption services that are dedicated, appliances that can perform encryption 3 00:00:14,710 --> 00:00:15,230 as well. 4 00:00:15,910 --> 00:00:21,730 The advantage of using these devices is that they normally provide more choice of encryption methods 5 00:00:21,730 --> 00:00:23,910 and stronger encryption options. 6 00:00:24,430 --> 00:00:31,240 They also offload the process from other devices like routers and services, which has a good thing 7 00:00:31,240 --> 00:00:37,810 because encryption and decryption process is a very tedious, intensive process and it involves other 8 00:00:37,810 --> 00:00:41,830 functions that routers and servers might not be performing. 9 00:00:43,000 --> 00:00:48,350 Sometimes these devices are called as encryption gateways, as you can see on the screen. 10 00:00:48,370 --> 00:00:55,300 This is an encryption appliance that can either sit in the line with the local social encrypting and 11 00:00:55,300 --> 00:01:00,100 decrypting all the traffic or they can function as an appliance or application. 12 00:01:00,110 --> 00:01:04,060 So encrypting any file that is sent to them within the network. 13 00:01:04,840 --> 00:01:08,470 Now you can see the examples of the encryption devices on your screen. 14 00:01:09,130 --> 00:01:15,670 While an encryption appliance is dedicated to encryption content filtering, appliance scans, the content 15 00:01:15,670 --> 00:01:21,220 of what goes through it and filters out specific content or content types. 16 00:01:21,940 --> 00:01:28,420 Now, dedicating a device to this process offloads the work on the servers or routers that could do 17 00:01:28,600 --> 00:01:31,950 this, but at a cost of greatly slowing the devices. 18 00:01:32,590 --> 00:01:38,830 Also, there is usually more functionality and granular control available with a dedicated appliance, 19 00:01:39,100 --> 00:01:41,830 and that is why we employ encryption devices. 20 00:01:42,920 --> 00:01:49,850 Internet e-mail is a good example of what you might run through one of these devices to filter out spam 21 00:01:50,090 --> 00:01:52,850 and objectionable content before the e-mail is delivered. 22 00:01:53,930 --> 00:02:00,890 Another example of the use of content filter might be to block basic websites based on the content of 23 00:02:00,890 --> 00:02:04,650 the Web pages rather than on the basis of the usual or IP address. 24 00:02:05,420 --> 00:02:12,050 An example of a dedicated content URL filtering application from a security point of view is shown on 25 00:02:12,050 --> 00:02:12,500 the screen. 26 00:02:12,500 --> 00:02:15,200 That is the DNA 120 rear-View. 27 00:02:16,070 --> 00:02:18,670 In the next lecture we will talk about analog modem. 28 00:02:19,010 --> 00:02:21,010 So I hope this lecture was pretty clear. 29 00:02:21,020 --> 00:02:28,490 The basic function of the encryption devices is to encrypt and prevent the data from malicious use or 30 00:02:28,490 --> 00:02:30,250 to just filter out packets. 31 00:02:30,800 --> 00:02:31,370 That's it. 32 00:02:31,370 --> 00:02:34,610 Now in the next lecture will talk something about the analog modem.