First page Back Continue Last page Overview Graphics
Where can you apply these cryptographic methods
At the link layer
At the network layer
At the transport layer
At the application layer
- SSH
- PGP and GPG
- System integrity checking, package management, etc