Question: Data security controls generally fall into two categories as they relate to the state of the data: controls pertaining to data at rest and in
Data security controls generally fall into two categories as they relate to the state of the data: controls pertaining to data at rest and in motion. Do you think there should be a third tenet to this (i.e., data in use)? Does it differ from data at rest? If so, what are some of the controls that pertain specifically to this category (if any)?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
