Answered You can hire a professional tutor to get the answer.
Discuss, in 500 words, how you would advise your current employer to use encryption to reduce the vulnerabilities of their data at rest, in use, and in transit (or in motion). Identify at
Discuss, in 500 words, how you would advise your current employer to use encryption to reduce the vulnerabilities of their data at rest, in use, and in transit (or in motion). Identify at what points you think their data is at the highest risk. Consider where the data is when it at rest, in transit, or in use and the potential vulnerabilities associated with each of those locations.
Cite your sources in-line and at the end. Provide a URL for your citations. Write in essay format not in bulleted, numbered or other list format. Do not copy without providing proper attribution. Be aware of your Safeassign score. Over 30 is too high. Use quotes to indicate where you have used other's words.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes cited in-line and in a list of references. Include an interesting meaningful title.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your paper. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested.
- Required ReadingChapter 2 in the text: Preventing Direct Access to Datahttps://www.zdnet.com/article/encrypting-data-at-rest-is-vital-but-its-just-not-happening/https://digitalguardian.com/blog/data-protection-data-in-transit-vs-data-at-resthttps://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atresthttps://www.datamotion.com/2015/12/best-practices-securing-data-at-rest-in-use-and-in-motion/
- Required VideosWatch this video about encrypting data at rest and in motion. Watch it for the issues related to encryption of data. It is not intended to be a commercial for Aberdeen or Vormetric.https://www.youtube.com/watch?v=5DsnvMkGLS4Transparent Data Encryptionhttps://www.youtube.com/watch?v=8DNx4s8q-8EHomomorphic Encryptionhttps://www.youtube.com/watch?v=NBO7t_NVvCchttps://www.youtube.com/watch?v=Kfwo-S2jZv4