A-Z Popular Blog Data Search »
Data
 Advertisements
Technology Guides

3 Examples of Data In Transit

 , updated on
Data in transit is data that is communicated from one device to another. This is an information security concept that is used to identify data that requires encryption. The following are common examples of data in transit.

Public Networks

Transfer of data over public networks such as the internet. For example, an app on a mobile phone connects to a banking service to request a transaction. Such data is typically encrypted using protocols such as HTTPs.

Private Networks

Transfer of data over a secured private network such as an local area network set up for an office location. The principle of defense in depth suggests that systems and applications should not trust that a network has been properly secured. As such, it is common to apply the same level of encryption for private networks as public networks.

Local Devices

Transfer of data between local devices such as computers, data storage devices and peripherals. Such data could be intercepted by the medium that is used for the transfer. For example, a usb cord that connects a data storage device and a computer could potentially record or transmit the data.
Overview: Data In Transit
Type
Definition
Data that is communicated from one device to another.
Related Concepts

Data

This is the complete list of articles we have written about data.
Abstract Data
Atomic Data
Big Data
Causality
Cohort
Cohort Analysis
Dark Data
Data
Data Analysis
Data Architecture
Data Attribute
Data Cleansing
Data Collection
Data Complexity
Data Consumer
Data Control
Data Corruption
Data Custodian
Data Degradation
Data Dredging
Data Entity
Data Federation
Data Integration
Data Integrity
Data Liberation
Data Lineage
Data Literacy
Data Loss
Data Management
Data Massage
Data Migration
Data Mining
Data Owner
Data Producer
Data Quality
Data Remanence
Data Risks
Data Rot
Data Science
Data Security
Data States
Data Transformation
Data Uncertainty
Data Veracity
Data View
Data Virtualization
Data Volume
Data Wipe
Decision Support
Deep Magic
Degaussing
Empirical Evidence
ETL
Event Data
Hard Data
Information Assurance
Legacy Data
Machine Data
Market Research
Master Data
Metadata
Metrics
Misuse of Statistics
Overfitting
Personal Data
Personal Information
Predictive Analytics
Primary Data
Primary Research
Privacy
Qualitative Data
Qualitative Info
Quantification
Quantitative Data
Raw Data
Reference Data
Small Data
Soft Data
Source Data
Statistical Analysis
Statistical Population
Structured Data
Transaction Processing
Transactional Data
Types Of Data
Unstructured Data
If you enjoyed this page, please consider bookmarking Simplicable.
 

Data Security

A list of common data security techniques.

Data Remanence

An overview of data remanence.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Masking vs Redaction

The difference between data masking and redaction.

Degaussing

A definition of degaussing as a data security technique.

Data Control

A definition of data control with examples.

Data States

An overview of the three data states.

Personal Data

Examples of the common types of personal data.

Cybersecurity Risk

An overview of cybersecurity risk at the organizational level.

Confidential Information

An overview of confidential information with examples.

Encryption Examples

A definition of encryption with examples.

Asymmetric vs Symmetric

The differences between asymmetric and symmetric encryption.

Random Seed

The definition of random seed with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map