From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Data states

Data states

- When developing a security architecture to protect our data, it's important to understand that people can access or modify data at any point during its lifecycle. We normally break this concept down into one of three data states: data at rest, when data is being stored; data in use, when data is being processed, and this can also refer to as data in process; or data in transit, where data is being moved from one location to another. The first data state we have is known as data at rest. Whenever data is physically stored on a digital format, we're going to call this data at rest. For example, if I save a file to a hard drive or a thumb drive, that data is at rest when it's not being actively accessed. Now, data at rest includes information stored in databases, backups, files, mobile devices, and many other storage medians. Now, to protect data at rest, most systems rely on symmetric or asymmetric encryption algorithms, or they use a hybrid of those two types. Data at rest encryption…

Contents