• Report an IT Security Incident
  • Request Help
  • Help & Support
    • Working/Learning Remotely
    • Request Help
    • Live Chat
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Contact Us
    • ITS Alerts Sign Up
  • Service Catalog
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Data, Reporting & Analytics
    • Network & Internet Services
    • Pilot Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
    • Web, Servers & Hosting
  • About ITS
    • Our Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Projects & Project Management
    • Technology Investment Request Lifecycle
    • Governance Committees
    • Business Intelligence
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Security Office
  • Alerts & Bulletins
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • Bulletins
    • Spotlights
    • After Action Reports
    • Archives
  • Report an IT Security Incident
  • Request Help
X Hide

Information Technology Services

Skip to content
  • Help & Support
    • Working/Learning Remotely
    • Request Help
    • Live Chat
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Contact Us
    • ITS Alerts Sign Up
  • Service Catalog
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Data, Reporting & Analytics
    • Network & Internet Services
    • Pilot Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
    • Web, Servers & Hosting
  • About ITS
    • Our Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Projects & Project Management
    • Technology Investment Request Lifecycle
    • Governance Committees
    • Business Intelligence
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Security Office
  • Alerts & Bulletins
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • Bulletins
    • Spotlights
    • After Action Reports
    • Archives

Knowledge Base

Home > Help & Support > Knowledge Base > Security > Highly Sensitive Data FAQ > What are some examples of encryption “in transport?”

What are some examples of encryption “in transport?”

Examples of encryption “in transport:”

  • HTTPS SSL: In a browser, an internet address that begins with “https://” indicates that SSL encryption is being used
  • SSH or SFTP: A protocol for attaching to systems using an encrypted channel (e.g. PUTTY, a common free client software tool)
  • Virtual Private Network (VPN): Technology that allows for an encrypted tunnel over the internet for communication between two endpoints; Mason supports a VPN solution for faculty and staff to securely connect to the university’s network resources
  • Remote Desktop Protocol (RCP) with strong encryption: Connects to a Microsoft Windows workstation remotely; requires the Strong Encryption option to be “enabled” which is not the default setting in Windows operating systems
  • Encrypted files sent with key/password exchanged through a separate type of communication: An example would be to send an encrypted file via email and then send the password via phone or fax. Multiple methods of encrypting files are available; some common ones include encryption built into WINZIP, PGP encryption. (The method of encryption used must be supported by both the sender and receiver of data.)
Last modified: October 6, 2020

Previous

When must Highly Sensitive Data (HSD) be protected by encryption?

Next

What is encryption “at rest?”

Related articles

  • How do I secure my computer?
  • What university policy governs permission to access or store Highly Sensitive Data (HSD)?
  • What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
  • When must Highly Sensitive Data (HSD) be protected by encryption?
  • What is encryption “at rest?"

Get Started at Mason

Whether you are a student, faculty, staff member, or a guest visiting the Mason campus, we have resources to help get you started.

Read More

Quick Links

Patriot Pass Password Reset
Submit a Ticket
Track a Ticket
PuTTY
Cisco AnyConnect VPN

Read More

Explore IT Services

A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z #

© 2022 George Mason University
4400 University Drive
Fairfax, Virginia 22030

Latest tweet

George Mason ITS Follow

The official Twitter page for George Mason University's Information Technology Services

GeorgeMasonITS
George Mason ITS @georgemasonits ·
23 Jan

After October 14, 2025, Microsoft will no longer provide security updates or support for Windows 10 systems. As a result, all Windows 10 systems must be upgraded to Windows 11 or removed from the Mason network. Learn more ⬇️

https://its.gmu.edu/bulletins/microsoft-windows-11-announcement/

Reply on Twitter 1617560494176620547 Retweet on Twitter 1617560494176620547 Like on Twitter 1617560494176620547 Twitter 1617560494176620547
View All
ITS Support Center
703-993-8870
support@gmu.edu
live chat
Monday – Thursday, 8 a.m. – 9 p.m.
Friday, 8 a.m. – 5 p.m.
Saturday, Closed
Sunday, 1 p.m. – 9 p.m.
(closed Thursday 3 p.m. – 4 p.m. for a team meeting) Modified Winter Hours Monday –Thursday,
8 a.m. – 7 p.m. Friday, 8 a.m. – 5 p.m. Saturday & Sunday,
Closed Normal business hours will resume on Sunday, January 22 at 1:00 p.m.
  • Webmaster