Suchisencoding a fileviewingthefile, playingthefilesomethinglikethat, oryouhavedataintransit.
Andthatiswhendataisgoingfrompoint A topoint B.
Sowhenyouneedwhenyou'rethinkingaboutencryption, youneedtothinkaboutthedifferentstatesofdatatodeterminewhatencryptiontoolsthatyou'regoingtousewhenyouhavedataatrest, you'llencryptthedatain a specificwaysothatif I hackerisabletobreakintoyourserverroom, theycan't justsimplystealoneoftheharddrives, gohome, pluggingintheircomputerandbe a bitofviewit.
Sotheideabeingthatifthereis a maninthemiddleattack, ifthere's somebodyinthemiddletryingtoreadtheinformationthattheywillnotbeabletoviewitAndsothisis a standardaway.
Wethinkaboutencryptionandtransit.
Sowethinkaboutthingslike S S l on a keyTPSSoifyou'regoingtobeviewing a website, youthinkaboutthingslike s ftpsecureFTP.
Soifyou'regoingtobeah, sendingfilesinanFTPtypeprocess, butyouwantthefilestobeencryptedorthedatatobeencryptedasit's movedfrompoint A topoint B, youwouldusesomethinglikesftporyouwouldusesomethinglike a VPNserver.
Oneofthingsthathascomeoutinthismodernworldisthatapparentlythe N S A hasliterallyputtapsonfiberopticlinesrunningfromcampusbuildingsindifferentSiliconValleycompanies.
Ifyou'regoing a longdistance, ifyou'regoingto a differentstate, orifyou'regoingoutsideofyourbuildingoryourinfrastructurenow, peoplehaverealizedishackerscangetinto a building.
Theycanputsomekindoftapontothenetworkinfrastructureinordertobeabletoreadpacketsonthenetworkagenciessuchasthe N S A.