answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: When situations must data at rest be encrypted?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Following situations must data at rest be encrypted?

A. Using a removable hard drive to transport data from one desktop to another off-site desktop.B. Using a thumb drive to transport data from one desktop at work to another desktop at work.C. Using a CD to transport data from a desktop at work to a home laptop.D. All of the Above (Correct!)


During a financial transactions what data should not be viewed by the rest of the world?

None of the data should be viewed by anyone and should be sent either encrypted or on a secure channel


For data that is Unclassified but not approved for public release DoD policy mandates that the data must be encrypted. Which devices must be encrypted?

Any device which contains data not approved for public release and is portable is subject to the DoD "Data at Rest" policy. The stored data must be encrypted on: Laptop computers Notebooks Cell phones BlackBerrys, Treos, Palm Pilots, smart phones and other functionally similar devices PDAs External hard drives CDs DVDs Floppy Disks (yeah - some people still use them) Thumb drives Flash cards Any other removable media For more details, Google the phrase "DoD data at rest" and check out some of the links to find the memo that details the requirements. I'd post the address of some good sites, but that would get this post flagged.


What are 3 states of data for protection?

Three states of data are : Data at rest, Data in motion & Data in use. Data at rest: Data at rest is a term used by computer professionals to describe all data in computer storage that is not currently being accessed or transferred. Data in motion: Data in motion is data that is moving or being transferred between locations within or between computer systems. Data in use: Data in use is data that is currently being updated, processed, accessed & read by a system... Data at rest must be protected at a high level & Moving data should be closely monitored.


It is important to protect data in motion transmission and data at rest storage In what other state must data be protected In which of the three states is data most difficult to protect?

Data in Use


Extreme numbers compared to the rest of the data are called?

Extreme numbers in the data as compared the the rest of the data are called OUTLIERS.


What is anomalous data?

Data that does not fit with the rest of the data set.


What is the term for a value separated from the rest of the data?

A value separated from the rest of the data is called an outlier


What do bed-rest studies have to do with space travel?

Bed rest mimics low (or micro) gravity situations.


What is A piece of data that is quite separated from the rest of the data?

outlier


Why is the mode not used very much as a measure of central tendency?

The mode is the value with the most data. Unfortunately it tells you nothing about the rest of the distribution. The mean and median provide more useful information in most situations.


What is security data at rest?

Security data at rest is data that is stored on a computer system or storage device instead of actively being used or transmitted. It is the data that is stored in a system or device and is not actively in use. This can include data stored on physical media such as disks tapes or USB drives as well as data stored on virtual media such as cloud services applications or databases. It is important to secure this data so that it is not compromised or stolen as it could be used by malicious actors for malicious purposes. Security data at rest requires certain measures to keep it safe. These measures can include: Encrypting the data Limiting access to the data Regularly monitoring the data Using secure protocols for communication Using secure authentication methodsThese measures can help protect the data from being accessed by unauthorized persons or from being maliciously altered. It is important to ensure that the measures taken are sufficient to protect the data and that they are regularly updated as the data and technology evolve.