Describe vulnerabilities and threats associated with data being stored, in transit, and in use.
Compare two cryptography tools and strategies for the project that would be beneficial for protecting data being stored, in transit, and in use.
Describe at least three additional noncryptography strategies for protecting stored data, data in transit, and/or data in use for the company.
Describe strategies and identify at least two tools for supporting the AAA framework in the company’s security solution.
Determine how you would consider applying access control and identify management to protect stored data, data in transit, and/or data in use for the company.
Define at least two policies or guidelines that you would include in the organization’s data security manual.
Describe vulnerabilities and threats associated with data being stored, in transit, and in use.
Compare two cryptography tools and strategies for the project that would be beneficial for protecting data being stored, in transit, and in use.
Describe at least three additional noncryptography strategies for protecting stored data, data in transit, and/or data in use for the company.
Describe strategies and identify at least two tools for supporting the AAA framework in the company’s security solution.
Determine how you would consider applying access control and identify management to protect stored data, data in transit, and/or data in use for the company.
Define at least two policies or guidelines that you would include in the organization’s data security manual.