click below
click below
Normal Size Small Size show me how
CYB1100-UI CH1.4.1
Foundations of Information Security _ Data at Rest and In Motion
| Question | Answer |
|---|---|
| Data at rest | is stored data that is not in the process of being moved from one place to another. |
| where is data at rest located at | It may be on a hard drive or flash drive, or it may be stored in a database |
| how is data at rest generally protected | This type of data is generally protected with some sort of encryption, often at the level of the file or entire storage device. |
| what is data in motion protected with | Data in motion is protected by encryption, but in this case the encryption protects the network protocol or path used to move the data from one place to another |
| What is an example of a scenario to describe data in motion | When you are using your online banking session, the sensitive data flowing between your web browser and your bank is data in motion |
| Data in motion | data that is moving from one place to another |
| what is the third category of data sometimes used | data in use |
| data in use | would be data that an application or individual was actively accessing or modifying |
| what are the protections on data in use | Protections on data in use would include permissions and authentication of users |
| often the concept of data in use conflated with | data in motion |
| what are the thoughts surrounding data in use being its own category separate from data in motion | Sound arguments can be made on both sides about whether we should treat this type of data as its own category. |