Page 82 - Demo
P. 82


                                    %u062c%u0645%u064a%u0639 %u0627%u0644%u062d%u0642%u0648%u0642 %u0645%u062d%u0641%u0648%u0638%u0629 %u0640 %u0627%u0625%u0644%u0639%u062a%u062f%u0627%u0621 %u0639%u0649%u0644 %u062d%u0642 %u0627%u0645%u0644%u0624%u0644%u0641 %u0628%u0627%u0644%u0646%u0633%u062e %u0623%u0648 %u0627%u0644%u0637%u0628%u0627%u0639%u0629 %u064a%u0639%u0631%u0636 %u0641%u0627%u0639%u0644%u0647 %u0644%u0644%u0645%u0633%u0627%u0626%u0644%u0629 %u0627%u0644%u0642%u0627%u0646%u0648%u0646%u064a%u062982Means Transforming text or data into cipher text that cannot be read by unintended recipients. There are two methods of encryption, Symmetric key encryption where Sender and receiver use single, shared key and public key encryption which uses two, mathematically related keys: public key and private key. Sender encrypts message with recipient%u2019s public key and recipient decrypts with private key. Example of symmetric key encryption is the Caesar Cipher technique which is one of the earliest and simplest method of encryption technique. It%u2019s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter some fixed number of positions down the alphabet. Use fault tolerant computer systems Contain redundant hardware, software, and power supply components that create an environment that provides continuous, uninterrupted service. A backup service comes online when the main service stops. 
                                
   76   77   78   79   80   81   82   83   84   85   86