Encryption on the wired and wireless
Who’s listening to your communications and how?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
🔒 Related Stories: Cybersecurity for Executives | Network Security | Encryption
💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
My last post in this series on Cybersecurity for Executives was about encryption at rest, which refers to encrypting data where it is stored. We also have to encrypt data when it’s moving from one location to another. If we fail to encrypt data transferred over a wired or wireless network, someone could easily intercept and read that data. Encrypting data as it moves between systems is referred to as encryption in transit.
How attackers can steal data on the network
I explained network ports and protocols in a previous post. When two systems send data back and forth, they need to send data to the right location and speak the same language. I wrote about IP, TCP, and UDP protocols. These protocols facilitate communications when computers such as web servers, database servers, and end-user systems talk to each other. At a very high level, when your computer…