![]() ![]() ![]() Which kind of encryption one chooses depends at least in part on what you are trying to protect the data from. Researchers who have sensitive data to protect may want to encrypt it while it is at rest on their hard drive or on a shared drive. Examples include using ssh from a command line, or using TLS with your web browser ( to access a secure resource, such as a Canvas website or your bank account. When data is encrypted in transit, it is protected from snoopers while it traverses the Internet (or any other network, such as an internal network). Encryption in transit does not guarantee encryption at rest, nor vice versa. There are 2 primary modalities for encryption: data can be encrypted while “in transit” and it can be encrypted while “at rest”. There are several different ways to encrypt your data, and which one you choose depends on a variety of factors such as your operating system and the use case that you are concerned about. Encryption technology is more widely used than ever before even iPhones are now regularly encrypted (as you may have seen in the news).Įncryption is an important tool in helping to keep sensitive data secure.
0 Comments
Leave a Reply. |