Secure Protocols - 4.5

Summary

Secure protocols like HTTPS should always be used to protect data during transmission by encrypting communication. Secure transport methods such as WPA3 and VPNs ensure that data remains encrypted and safe from interception over networks.


Notes:

Protocol Selection

  • Use secure protocols whenever possible to protect data during transmission. For example, HTTPS (which encrypts communication using SSL/TLS) should be used instead of HTTP to secure web traffic.

Port Selection

  • Secure protocols generally use specific ports for encrypted communication. For instance, HTTPS uses port 443, while HTTP uses port 80. Always ensure secure ports are in use where possible.

Transport Method

  • Use modern encryption technologies like WPA3 for securing Wi-Fi connections and Virtual Private Networks (VPNs) for creating secure tunnels over public or untrusted networks. These methods encrypt data, protecting it from interception during transmission.