Unencrypted network data
Network traffic is important data– Everything must be protected
* Some protocols aren’t encrypted– All traffic sent in the clear– Telnet, FTP, SMTP, IMAP
* Verify with a packet capture– View everything sent over the network
Protocol selection
Port Selection (see example in notes)
Transport method
Virtual private network (VPN)
– Create an encrypted tunnel– All traffic is encrypted and protected– Often requires third-party services and software