COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Data-in-transit
|
|
Data-at-rest
|
|
Data-in-use
|
|
None of the above
|
Detailed explanation-1: -The three states of data are data at rest, data in motion and data in use. Data can change states quickly and frequently, or it may remain in a single state for the entire life cycle of a computer.
Detailed explanation-2: -This protection allows to keep the documentation safe in its three states: In transit, in remote and in use. The protection travels with the document and accompanies it wherever it travels allowing the user to work with the data, knowing that if necessary, he will not have complete control of it.
Detailed explanation-3: -Unencrypted data is unprotected information that is easily readable. Unencrypted data is a high security risk because it can be intercepted during transmission. POS systems may send data from terminals around the store and receive orders from a website over the internet.
Detailed explanation-4: -HR data. Unless you’re a sole trader, every company has employees, and this comes with a large amount of sensitive data that must be protected. Commercial information. Legal information. 01-Dec-2016