Podcast
Questions and Answers
What are the three states that security professionals consider when thinking about data security?
What are the three states that security professionals consider when thinking about data security?
Which type of data is vulnerable to theft if an attacker gains access to the storage media?
Which type of data is vulnerable to theft if an attacker gains access to the storage media?
What are examples of data at rest?
What are examples of data at rest?
What does data in motion refer to?
What does data in motion refer to?
Signup and view all the answers
Why must information security professionals protect against both physical and logical access to storage media?
Why must information security professionals protect against both physical and logical access to storage media?
Signup and view all the answers
Why is it important to protect data in motion?
Why is it important to protect data in motion?
Signup and view all the answers
What is an example of using encryption to protect sensitive information at rest?
What is an example of using encryption to protect sensitive information at rest?
Signup and view all the answers
What is the primary concern for securing big data storage and analysis?
What is the primary concern for securing big data storage and analysis?
Signup and view all the answers
What is the purpose of using access controls in data protection?
What is the purpose of using access controls in data protection?
Signup and view all the answers
Why might big data rarely use relational databases?
Why might big data rarely use relational databases?
Signup and view all the answers
What is the primary focus of information security professionals when considering data security?
What is the primary focus of information security professionals when considering data security?
Signup and view all the answers
In what state is data vulnerable to theft if an attacker gains access to the storage media?
In what state is data vulnerable to theft if an attacker gains access to the storage media?
Signup and view all the answers
What does 'data in motion' refer to in the context of data security?
What does 'data in motion' refer to in the context of data security?
Signup and view all the answers
What is the primary purpose of using encryption in data protection?
What is the primary purpose of using encryption in data protection?
Signup and view all the answers
Which method can be an effective way to steal data at rest?
Which method can be an effective way to steal data at rest?
Signup and view all the answers
Why does big data rarely use relational databases?
Why does big data rarely use relational databases?
Signup and view all the answers
What is the main concern for securing big data storage and analysis?
What is the main concern for securing big data storage and analysis?
Signup and view all the answers
What is the purpose of access controls in data protection?
What is the purpose of access controls in data protection?
Signup and view all the answers
What does data in use refer to?
What does data in use refer to?
Signup and view all the answers
Why should organizations have clear policies surrounding the appropriate use of data and security controls?
Why should organizations have clear policies surrounding the appropriate use of data and security controls?
Signup and view all the answers