SlideShare a Scribd company logo
1 of 2
New Content for Section 4: Technical Controls
This week will focus on using encryption to protect the
organization's data.
Describe the concept of
encryption.
Include a discussion about
symmetric
and
asymmetric
encryption.
Provide a description of at least 2 different encryption
algorithms.
When looking at data with respect to a database environment, it
should be viewed in 2 ways: the interaction (the transfer of
data) and the storage (the database files).
Take this opportunity to describe what is meant by
data at rest
and
data in motion.
How can encryption techniques be applied to these 2 concepts?
When applying encryption to a system, the confidentiality and
integrity of data is critical.
Show how encryption can provide protection in these 2 areas.
Describe the mechanisms that can be applied to messages (data
in motion) so that the following can be provided:
Confidentiality
Integrity
Authentication
This information should be 2–3 pages of details added to your
Data Security, Quality, and Integrity document.
New Content for Section 4 Technical ControlsThis week will focus .docx

More Related Content

Similar to New Content for Section 4 Technical ControlsThis week will focus .docx

SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
Editor IJMTER
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
FITSFSd
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
International Journal of Engineering Inventions www.ijeijournal.com
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
cockekeshia
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 

Similar to New Content for Section 4 Technical ControlsThis week will focus .docx (20)

File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...Data attribute security and privacy in Collaborative distributed database Pub...
Data attribute security and privacy in Collaborative distributed database Pub...
 
A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
Cryptography introduction
Cryptography introductionCryptography introduction
Cryptography introduction
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
 
A Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data MiningA Novel Filtering based Scheme for Privacy Preserving Data Mining
A Novel Filtering based Scheme for Privacy Preserving Data Mining
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
 
Paper id 28201425
Paper id 28201425Paper id 28201425
Paper id 28201425
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 

More from darwinming1

Note I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docxNote I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docx
darwinming1
 
North, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docxNorth, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docx
darwinming1
 
Not only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docxNot only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docx
darwinming1
 
Note Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docxNote Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docx
darwinming1
 
NOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docxNOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docx
darwinming1
 
New Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docxNew Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docx
darwinming1
 
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docxNine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
darwinming1
 

More from darwinming1 (20)

Not all countries have moved through all 4 phases of the demographic.docx
Not all countries have moved through all 4 phases of the demographic.docxNot all countries have moved through all 4 phases of the demographic.docx
Not all countries have moved through all 4 phases of the demographic.docx
 
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docxNOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
NOTE I need just 150-200 words answer with 1-2 references in APA. M.docx
 
Note I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docxNote I need 2 pages paper addressing the provided details. Please.docx
Note I need 2 pages paper addressing the provided details. Please.docx
 
Not-for-profit organizations are using social media to redefine how .docx
Not-for-profit organizations are using social media to redefine how .docxNot-for-profit organizations are using social media to redefine how .docx
Not-for-profit organizations are using social media to redefine how .docx
 
North, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docxNorth, South and West Please respond to the following (Note Pl.docx
North, South and West Please respond to the following (Note Pl.docx
 
North, South and West Please respond to the following (Note Plea.docx
North, South and West Please respond to the following (Note Plea.docxNorth, South and West Please respond to the following (Note Plea.docx
North, South and West Please respond to the following (Note Plea.docx
 
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docxNo unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
No unread replies.88 replies.Go to httpwww.eagles.orgvu-.docx
 
Not only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docxNot only are people born into a specific culture, they also are soci.docx
Not only are people born into a specific culture, they also are soci.docx
 
NOTE I am very particular about my papers. Please do not respond if.docx
NOTE I am very particular about my papers. Please do not respond if.docxNOTE I am very particular about my papers. Please do not respond if.docx
NOTE I am very particular about my papers. Please do not respond if.docx
 
Note Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docxNote Be sure to review the examples and hints provided with e.docx
Note Be sure to review the examples and hints provided with e.docx
 
NOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docxNOTE A Power point presentation is also required along side this.docx
NOTE A Power point presentation is also required along side this.docx
 
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
No plagiarismBetween 10 and 15 relevant academic journals with H.docxNo plagiarismBetween 10 and 15 relevant academic journals with H.docx
No plagiarismBetween 10 and 15 relevant academic journals with H.docx
 
No plagirism , please I need this on time due 41715 no work cited .docx
No plagirism , please I need this on time due 41715 no work cited .docxNo plagirism , please I need this on time due 41715 no work cited .docx
No plagirism , please I need this on time due 41715 no work cited .docx
 
no need outside source expect for Durkheims on suicideFor the t.docx
no need outside source expect for Durkheims on suicideFor the t.docxno need outside source expect for Durkheims on suicideFor the t.docx
no need outside source expect for Durkheims on suicideFor the t.docx
 
No matter where I worked or what job I held, it was my interpersona.docx
No matter where I worked or what job I held, it was my interpersona.docxNo matter where I worked or what job I held, it was my interpersona.docx
No matter where I worked or what job I held, it was my interpersona.docx
 
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
no more than 1,250 words. A strategic plan for ESPN, including the f.docxno more than 1,250 words. A strategic plan for ESPN, including the f.docx
no more than 1,250 words. A strategic plan for ESPN, including the f.docx
 
No other country in the world has a health care system like that of .docx
No other country in the world has a health care system like that of .docxNo other country in the world has a health care system like that of .docx
No other country in the world has a health care system like that of .docx
 
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docxNO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
NO PLAGARISM IF YOU CANNOT DO ORIGINAL AND GOOD QUALITY WORK, THE.docx
 
New Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docxNew Opportunities in Community SettingsCommunity based nursing h.docx
New Opportunities in Community SettingsCommunity based nursing h.docx
 
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docxNine-year-old Wandas teacher notices that for the past few weeks, W.docx
Nine-year-old Wandas teacher notices that for the past few weeks, W.docx
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

New Content for Section 4 Technical ControlsThis week will focus .docx

  • 1. New Content for Section 4: Technical Controls This week will focus on using encryption to protect the organization's data. Describe the concept of encryption. Include a discussion about symmetric and asymmetric encryption. Provide a description of at least 2 different encryption algorithms. When looking at data with respect to a database environment, it should be viewed in 2 ways: the interaction (the transfer of data) and the storage (the database files). Take this opportunity to describe what is meant by data at rest and data in motion. How can encryption techniques be applied to these 2 concepts? When applying encryption to a system, the confidentiality and integrity of data is critical. Show how encryption can provide protection in these 2 areas. Describe the mechanisms that can be applied to messages (data in motion) so that the following can be provided: Confidentiality Integrity Authentication This information should be 2–3 pages of details added to your Data Security, Quality, and Integrity document.