08. Encryption in Transit

Encryption in Transit Heading

Encryption in Transit

ND545 C02 L04 A07 Encryption In Transit Part 1 V2

Encryption in Transit Notes

Recap:

  • If data is moving from one location to another, particularly over public internet it is very vulnerable to compromise.
    • Either encrypt the data prior to sending it.
    • Or encrypt the data while it's in motion. That's what this section is about.
  • Data in transit generally uses Asymmetric Encryption and PKI.
  • We learned about several common techniques for data in transit:
    • HTTPS/TLS HyperText Transport Protocol/Transport Layer Security
    • SSH Secure Shell
    • SFTP/FTPS Secure File Transfer Protocol/File Transfer Protocol over SSL.
    • RDP Remote Desktop Protocol

Key Terms

  • Bitlocker: is a full volume encryption feature included with Microsoft Windows.
  • Data at rest: means inactive data that is stored physically in any digital form.
  • 7-zip: is a free and open-source file archiver, a utility used to place groups of files within compressed, encrypted containers known as "archives".
  • Data in transit: also referred to as data in motion, is defined into two categories, information that flows over the Internet and data that flows in the confines of a private network.

Encryption in Transit Heading Image

Encryption in Transit

Encryption in Transit

Choosing the Right Encryption

ND545 C02 L04 A07 Encryption In Transit Part 2

Choosing the Right Encryption

How do you know which encryption method is right for data in transit?
For data in transit, the choices are a bit more clear and based on what you're trying to accomplish.

Type Goal
HTTP/TLS Processing or hosting sensitive data accessible from the internet
SSH Hosting servers (particularly Linux) to execute commands and process jobs
SFTP or FTPS Hosting files for others to download (Choice depends on the configuration of the host they reside on)
Encryption at Rest For additional security, consider using on files that are to be accessed via SSH or SFTP/FTPS

Note: If you recall from a previous lesson it is wise to not have SSH open to the internet, likewise RDP. consider setting up a VPN for those use cases as an additional layer of security.

Choosing the Right Encryption

Choosing the Right Encryption

ND545 C02 L04 A08 Encryption In Transit Walkthrough

Encryption in Transit Heading New Terms

Additional Resources: