logo

181 Transmit data using secure protocols


Summary

The transmission of sensitive information and the execution of sensitive functions must be performed through secure protocols.


Description

A system can send information through a non-encrypted channel using insecure protocols. The use of these protocols makes it easier to perform a man-in-the-middle attack (MitM) to intercept and modify the information. Examples of such insecure protocols are HTTP, FTP, POP3 and Telnet.


Supported In

Essential: True

Advanced: True


References


Weaknesses


Last updated

2024/03/05