Watch this video on YouTube
Which of the following methods is commonly used to secure data in transit?