There are a number of mechanisms, protocols, and utilities that make using the Internet safer for sharing private data and conducting business transactions. In broad terms, this is accomplished by securing the TCP/IP suite of protocols following the guidelines of the CIA triad, which looks to secure the confidentiality, integrity, and availability of data.
Using a digital certificate from a reputable certificate authority (CA) is a must. Using Secure Shell (SSH) for remote management to encrypt traffic to and from an SSH server is a must. Using Transport Layer Security ...
Get Mike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition (Exam N10-008), 6th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.