From the course: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Understanding data security

Understanding data security

- [Instructor] Data is often an organization's most valuable asset. As such, it's appropriate that information security professionals spend a large amount of their time ensuring the confidentiality, integrity, and availability of information assets. When security professionals think about data security, they normally begin by thinking about the security controls used to protect data in three different states, data at rest, data in transit, and data in use. Data at rest is data stored somewhere for later use. This might be on a hard drive or USB stick, in a cloud service, or on a magnetic tape as part of a backup or archival solution. Data at rest is vulnerable to theft. If an attacker gains either physical or logical access to the storage media, this might be by stealing a hard drive or hacking into an operating system that has the drive mounted. Either method can be an effective way to steal data, and information security professionals must protect against both approaches. Data in…

Contents