Computer Science (Year 9)

Networking

Which of these protocols is used for secure data transmission over the internet?