Podcast
Questions and Answers
What are the three states that security professionals consider when thinking about data security?
What are the three states that security professionals consider when thinking about data security?
- Data in storage, data in transit, and data in processing
- Data stored, data transferred, and data accessed
- Data at rest, data in motion, and data in use (correct)
- Data at rest, data in processing, and data in transit
Which type of data is vulnerable to theft if an attacker gains access to the storage media?
Which type of data is vulnerable to theft if an attacker gains access to the storage media?
- Data in use
- Data in processing
- Data in motion
- Data at rest (correct)
What are examples of data at rest?
What are examples of data at rest?
- Data on a smartphone, in an email, and on a social media platform
- Data on a website, in a network, and on a USB stick
- Data on a server, in a database, and on a mobile device
- Data on a hard drive, in a cloud service, and on a magnetic tape (correct)
What does data in motion refer to?
What does data in motion refer to?
Why must information security professionals protect against both physical and logical access to storage media?
Why must information security professionals protect against both physical and logical access to storage media?
Why is it important to protect data in motion?
Why is it important to protect data in motion?
What is an example of using encryption to protect sensitive information at rest?
What is an example of using encryption to protect sensitive information at rest?
What is the primary concern for securing big data storage and analysis?
What is the primary concern for securing big data storage and analysis?
What is the purpose of using access controls in data protection?
What is the purpose of using access controls in data protection?
Why might big data rarely use relational databases?
Why might big data rarely use relational databases?
What is the primary focus of information security professionals when considering data security?
What is the primary focus of information security professionals when considering data security?
In what state is data vulnerable to theft if an attacker gains access to the storage media?
In what state is data vulnerable to theft if an attacker gains access to the storage media?
What does 'data in motion' refer to in the context of data security?
What does 'data in motion' refer to in the context of data security?
What is the primary purpose of using encryption in data protection?
What is the primary purpose of using encryption in data protection?
Which method can be an effective way to steal data at rest?
Which method can be an effective way to steal data at rest?
Why does big data rarely use relational databases?
Why does big data rarely use relational databases?
What is the main concern for securing big data storage and analysis?
What is the main concern for securing big data storage and analysis?
What is the purpose of access controls in data protection?
What is the purpose of access controls in data protection?
What does data in use refer to?
What does data in use refer to?
Why should organizations have clear policies surrounding the appropriate use of data and security controls?
Why should organizations have clear policies surrounding the appropriate use of data and security controls?