62. Data States

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Data States

Data at rest

Data in transit

Data in use

2
New cards

At Rest Encryption Types

Full Disk Encryption

Partition Encryption

File Encryption

Volume Encryption

Database Encryption

Record Encryption

3
New cards

In Transit Encryption Types

SSL and TLS

VPNs

IPSec

4
New cards

In Use Protections

Encryption at application Level

Access controls

Secure enclaves

Intel software guards (encrypts as is in memory)

5
New cards
Data at rest
Data stored n databases, file systems, or other storage systems
6
New cards
Data in Motion
Data actively moving from one location to another, such as across the Internet or through a private network
7
New cards
Data in transit
Data actively moving from one location to another, such as across the Internet or through a private network
8
New cards
Data in use
Data in the process of being created, retrieved, updated or deleted
9
New cards
Full Disk Encryption
Encrypts entire hard drive
10
New cards
Partition Encryption
Encrypts specific partitions of a hard drive and not others
11
New cards
File Encryption
Encrypts individual files
12
New cards
Volume Encryption
Encrypts a set of selected files or directories
13
New cards
Database Encryption
Encrypts data stored in a database at the column, row, or table level
14
New cards
Record Encryption
Encrypts specific fields within a database record
15
New cards
SSL and TLS
Secure Sockets Layer and Transport Layer Security
16
New cards
Secure Sockets Layer and Transport Layer Security
Cryptographic protocols designed to provide secure communication over a computer network
17
New cards
VPNs
Virtual Private Networks
18
New cards
Virtual Private Networks
Technology that creates a secure connection over a less secure network, like the Internet
19
New cards
IPsec
Internet Protocol Security
20
New cards
Internet Protocol Security
Protocol suite used to secure IP communications by authenticating and encrypting each IP packet in a data stream