Referring to CIA, where would a hash-only make more sense?
A. Data at Rest
B. Data on File
C. Other option
Correct Answer: A
Explanation/Reference:
Confidentiality
Confidentiality ensures that data is only viewable by authorized users. In other words, the goal of confidentiality is to prevent the unauthorized disclosure of information. Loss of confidentiality indicates that unauthorized users have been able to access information.
If there is a risk of sensitive data falling into the wrong hands, it should be encrypted to make it unreadable. This includes encrypting data at rest and data in motion. Data at rest is any data stored as a file on a hard drive, mobile device, or even a USB flash drive. Data in motion is any data traveling over a network. AES is the most common symmetric encryption protocol used to encrypt data at rest. SSH, IPsec, SSL, and TLS are some common encryption protocols used to encrypt data in motion.
Additionally, data should be protected with access controls to enforce confidentiality.
Explanation/Reference:
Confidentiality
Confidentiality ensures that data is only viewable by authorized users. In other words, the goal of confidentiality is to prevent the unauthorized disclosure of information. Loss of confidentiality indicates that unauthorized users have been able to access information.
If there is a risk of sensitive data falling into the wrong hands, it should be encrypted to make it unreadable. This includes encrypting data at rest and data in motion. Data at rest is any data stored as a file on a hard drive, mobile device, or even a USB flash drive. Data in motion is any data traveling over a network. AES is the most common symmetric encryption protocol used to encrypt data at rest. SSH, IPsec, SSL, and TLS are some common encryption protocols used to encrypt data in motion.
Additionally, data should be protected with access controls to enforce confidentiality.