Computer Science, asked by Tara3441, 2 months ago

What are three states of data during which data is vulnerable? (Choose three.)

Answers

Answered by Rishabh5169
0

Answer:

1. Purged data

2. Encrypted data

3. Decrypted data

Brainliest ^_^

Answered by crkavya123
0

Answer:

in transit, in process, or in storage.

Data can exist in three basic states: at rest, in motion, and in use. The three states of data and the many types of encryption and security required to safeguard them are briefly described here. Data held on a device or backup medium in any format is referred to as being "at rest."

Explanation:

To properly secure data and information, a cybersecurity professional has to be knowledgeable of each of the three states of data. Data that was deleted had been kept. Data that has been encrypted or decrypted can be in any of the three states.

Three states of information

The three basic states that information can be in at once are listed in this section. Since the relevant security measures for each of these states differ, it is imperative to clearly identify each state. The information that is now present in one of the three states in a computing environment is identified in order to treat each independently. Information in process, information in storage, and information in transit are the three states that are listed. When data is being transmitted from one location (source) to another over an underlying network, whether wired or wireless, this is known as information in transit (destination). When data is processed to change from source format to destination format, it is referred to as information in the process. And information in storage refers to the data that is mainly inactive and is kept on a storage medium for later use. These succinct summaries suggest that each state's information differs from that of other states in terms of its qualities. Information in transit, for instance, differs between information in use and information that is being stored. The fact that these stages might overlap to create several variants should also be highlighted. As an illustration, states can take several forms in pairs, such as processing information first and then transferring it, storing it first and then processing it later, retrieving information from storage for further processing, etc. If you want a more complicated format, each of The three states of information can be combined in any order to create a series of actions, such as retrieving stored information from a database, processing it to create new information, and sending that new information to a distant location. The subsections that follow go into great depth on each state of information by first explaining them and then giving instances for each state. This later provides a foundation for describing security and privacy precautions with regard to each state of information that is discussed in Section 3 later.

learn more

https://brainly.in/question/11575598

https://brainly.in/question/11831166

#SPJ2

Similar questions