First page Back Continue Last page Overview Graphics
Cryptography isn't really an option!
- Cryptographically enhanced systems offer the protection you need now, to protect your systems, your users and their data.
- Important first steps:
- Use SSH exclusively for system administration.
- Use SCP/SFTP for all file transfers not wrapped in SSL or done anonymously.
- Install POP3/IMAP and SMTP servers with TLS support.
- Use SSL/HTTPS for applications involving passwords or proprietary data (like webmail applications).