Access over 20 million homework & study documents

Data Encryption R0

Content type
User Generated
Subject
Computer Science
School
nltc
Type
Homework
Rating
Showing Page:
1/4

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running Head: DATA ENCRYPTION 1 Data Encryption Student’s Name Course Title Instructor’s Name Institution Affiliation Date DATA ENCRYPTION 2 Data Encryption Data is vulnerable to numerous risks when it is in use, at transit or in a rest state and thus protection against these risks is recommended. The hackers always try different potential ways of compromising the system, and therefore, I would advise my employer to apply encryption to data regardless of the state the data is. Encryption is a technique of protecting data that converts the data into a code that can only be accessed by the authorized people. The data the organization has is in three states that is data at rest, in transit and use. Encryption can be performed on data at all these states (Janacek, 2019). To begin with, data at rest can either be stored in a database, mobile devices, flash disks, and hard drives where it is left open to malware or virus attack. To protect data at rest, the organization should install firewalls and antivirus programs in the system to filter out any virus or malware that enters into the system. The hackers, however, can compromise the network of the system and gain access to the ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4