• Live Chat
  • Report an IT Security Incident
  • Request Help
  • Help & Support
    • Request Help
    • Live Chat
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Contact Us
  • Service Catalog
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Data, Reporting & Analytics
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
    • Web, Servers & Hosting
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Spotlights
    • Bulletins
George Mason University
  • Live Chat
  • Report an IT Security Incident
  • Request Help
X Hide

Information Technology Services

Skip to content
  • Help & Support
    • Request Help
    • Live Chat
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Contact Us
  • Service Catalog
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Data, Reporting & Analytics
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
    • Web, Servers & Hosting
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Spotlights
    • Bulletins

Knowledge Base

Home > Help & Support > Knowledge Base > Security > Highly Sensitive Data > What are some examples of encryption “in transport?”

What are some examples of encryption “in transport?”

Examples of encryption “in transport:”

  • HTTPS SSL: In a browser, an internet address that begins with “https://” indicates that SSL encryption is being used
  • SSH or SFTP: A protocol for attaching to systems using an encrypted channel (e.g. PUTTY, a common free client software tool)
  • Virtual Private Network (VPN): Technology that allows for an encrypted tunnel over the internet for communication between two endpoints; Mason supports a VPN solution for faculty and staff to securely connect to the university’s network resources
  • Remote Desktop Protocol (RCP) with strong encryption: Connects to a Microsoft Windows workstation remotely; requires the Strong Encryption option to be “enabled” which is not the default setting in Windows operating systems
  • Encrypted files sent with key/password exchanged through a separate type of communication: An example would be to send an encrypted file via email and then send the password via phone or fax. Multiple methods of encrypting files are available; some common ones include encryption built into WINZIP, PGP encryption. (The method of encryption used must be supported by both the sender and receiver of data.)
Last modified: October 6, 2020

Previous

When must Highly Sensitive Data be protected by encryption?

Next

What is encryption “at rest?”

Related articles

  • How do I secure my computer?
  • What university policy governs permission to access or store Highly Sensitive Data?
  • What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
  • When must Highly Sensitive Data be protected by encryption?
  • What is encryption “at rest?"

Get Started at Mason

Whether you are a student, faculty, staff member, or a guest visiting the Mason campus, we have resources to help get you started.

READ MORE

Quick Links

Patriot Pass Password Reset
Create a Ticket
Track a Ticket
PuTTY
Cisco AnyConnect VPN

READ MORE

Explore IT Services

A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z #

I T S Logo

© 2024 George Mason University
4400 University Drive
Fairfax, Virginia 22030

Follow Us
location pin for in-person IT support   @GeorgeMasonITS
location pin for in-person IT support   @georgemasonits
ITS Support 24/7
   703-993-8870
   Live Chat
  • Webmaster
X

ITS Technical Support Now Available 24/7

Students, faculty, and staff can receive technical support any time—day or night, on weekends, and even holidays. If you need IT help, call 703-993-8870 anytime or create a request ticket.