Is the NC State wireless Nomadic network secure?
• Wireless network users are responsible for the security of the data transmissions they send over the wireless network. Transmissions over the wireless network are not encrypted or secure. Users are strongly encouraged to use secure application-level protocols when sensitive information traverses the wireless network; otherwise, they should move to the wired network. Example secure application-level protocols are: https, ssh, scp, vpn.
Wireless network users are responsible for the security of the data transmissions they send over the wireless network. Transmissions over the wireless network are not encrypted or secure. Users are strongly encouraged to use secure application-level protocols when sensitive information traverses the wireless network; otherwise, they should move to the wired network. Example secure application-level protocols are: https, ssh, scp, vpn.