ICT (Year 8)

Internet Protocols

Which of the following protocols is used for secure communication over a computer network?