anne4moore
asked on
Secure Transmission Medias
In today's current technological industry, what tends to be the most secure transmission medias? What are the least secure? List all that apply for each.
ASKER
Well I am just looking for your input and opinion based on your use, and expertise. For example, would you continue to use dial-up, T-line tranmissions, DSL, telnet, wireless, etc. Why would you use one over the other? Give specifics (i.e. dial-up security specs vs DSL security specs, etc)...
If your really concerned use good encryption between the two sides.
Wireless = no, unless your connecting to the gateway with encryption, with a method to valid the gateway.
The rest depend on the security, most DSL companies lock down traffic, so no traffic is seen by another client. Cable companies not so much.
Dial up is pretty good.
Without taking other steps, if someone wants to get you, they still can.
CH
Wireless = no, unless your connecting to the gateway with encryption, with a method to valid the gateway.
The rest depend on the security, most DSL companies lock down traffic, so no traffic is seen by another client. Cable companies not so much.
Dial up is pretty good.
Without taking other steps, if someone wants to get you, they still can.
CH
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
No comment has been added to this question in more than 21 days, so it is now classified as abandoned.
I will leave the following recommendation for this question in the Cleanup topic area:
Accept - lrmoore
Any objections should be posted here in the next 4 days. After that time, the question will be closed.
Bill_Fleury
EE Cleanup Volunteer
I will leave the following recommendation for this question in the Cleanup topic area:
Accept - lrmoore
Any objections should be posted here in the next 4 days. After that time, the question will be closed.
Bill_Fleury
EE Cleanup Volunteer
It all depends on the encryption technology and protocols being used. Key size affects its sucess, but also the algorithm, 3DES, SHA-2, etc.
The most secure transmissions are one's that have been encrypted. ie: SSH. Least secure would be those not encrypted. Ie: telnet