Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certificates.
Which of the following protocols is used by Bella?
Henrikrp
Highly Voted 1 year, 5 months agojeremy13
Highly Voted 1 year, 7 months agodesertlotus1211
Most Recent 7 months, 3 weeks agodesertlotus1211
7 months, 3 weeks ago[Removed]
11 months, 2 weeks agoinsaniunt
11 months, 3 weeks agosringan
1 year, 1 month agoTafulu
1 year, 3 months agoVincent_Lu
1 year, 5 months agoThoHNguyen
1 year, 4 months agoVincent_Lu
1 year, 5 months agoboog
1 year, 5 months agoboog
1 year, 5 months agobellabop
1 year, 7 months agoeli117
1 year, 7 months ago581777a
1 year, 3 months ago