9.3.1 Data Transmission Encryption
Learn what network protocols to use to protect data being transmitted over the internet.
An attacker can potentially intercept and read data sent through a network. It's best to secure transactions by encrypting data sent through a network using some of the following methods.
VPNs
Use a VPN that uses the IPsec, PPTP, or L2TP protocol.
Secure Sockets Layer (SSL)
An addon-based protocol that's often used in tandem with other network protocols to provide security and encryption. For example, HTTPS uses SSL to secure web transactions.
Wireless
Use WPA, WPA2, but never WEP when using wireless networks to prevent eavesdropping.
Network Services
Avoid using protocols that send credentials in cleartext (i.e. FTP or Telnet). Instead, use FTP-S or SSH.
#IX
#Aplus