Listen to this page: 
OWASP Top 10 Privacy Risk Countermeasures
OWASP is the acronym for the Open Web Application Security Project
.
10. Insecure Data Transfer
- Risk Description
-
Failure to provide data transfers over encrypted and secured channels which would exclude the possibility of data leakage.
-
Failure to enforce mechanisms limiting the leak surface, e.g., allowing the inference of any user data out of the mechanics of Web application operation.
-
- How to check?
-
-
What are the policies for protecting data in transit?
Is data encrypted during transfer?
Are secure protocols and algorithms used?
-
Are privacy-friendly protocols available for transfer?
-
Are private protocols enforced where appropriate (e.g., login is only available over HTTPS, and sensitive records only accessible by TLS or SFTP)?
-
- Countermeasures
-
-
Always send personal data by secure protocols, i.e., not an insecure protocol like ordinary email, many instant messaging clients, FTP.
-
Configure transfer protocols so they are secure enough for the types of data being transmitted.
-
Allow connections using the best available secure protocols, where possible.
-
Disallow weak protocols for sensitive information.
-
Avoid personal information in the URL, especially if the data transfer is unencrypted.
-
Activate privacy in protocols (e.g. Privacy Extensions in IPv6).
Support TLS/DTLS, do not support SSLv3.
-
Use ECDHE and GCM ciphers, do not support static RSA key exchange and CBCbased ciphers.
-
- Examples
-
-
Configure services to disable broken security protocols such as SSLv3.
-
Configure services to enable the latest secure protocols.
-
Enforce HTTPS for the entire Web application session, from first visit to login page to completion of logout.
-
Disable vulnerable file transfer services such as Telnet and FTP on file servers. Enable secure transfer protocols instead.
-
About the insecurity of current internet technologies and the initiative to build new ones: see You Broke the Internet.org
-
- References