Step 4: Protect Data— in Motion, in Process, and at Rest Encryption is an effective, well-established way to protect sensitive data because even if information is lost, it remains unusable. Encryption is critically important for protecting data covered by regulations and standards such as the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and Payment Card Industry (PCI). Increasingly, these and other regulations are encouraging—and specifying—encryption in certain usage scenarios. And the penalties for noncompliance are stiffer than ever. There are a number of ways to perform encryption, but typically it comes with a cost—what is often referred to as a performance tax. As an IT manager, you must to be able to justify the trade-off in performance with the requirement for secure data. What Types of Data Should You Encrypt? Data in motion Data in flight over networks (Internet, e-commerce, mobile devices, automated teller machines, and so on) Data that uses protocols such as Secure Sockets Layer (SSL), Transport Layer Security (TLS), Internet Protocol Security (IPsec), Hypertext Transfer Protocol Secure (HTTPS), FTP, and Secure Shell (SSH) Data in process Transactional data in real time, such as encrypted fields, records, rows, or column data in a database Data at rest Files on computers, servers, and removable media Data stored using full disk encryption (FDE) and applicationlevel models 13 Intel IT Center Planning Guide | Cloud Security
Cloud Computing Security Planning Guide - Page 0001.html
Cloud Computing Security Planning Guide - Page 0002.html
Cloud Computing Security Planning Guide - Page 0003.html
Cloud Computing Security Planning Guide - Page 0004.html
Cloud Computing Security Planning Guide - Page 0005.html
Cloud Computing Security Planning Guide - Page 0006.html
Cloud Computing Security Planning Guide - Page 0007.html
Cloud Computing Security Planning Guide - Page 0008.html
Cloud Computing Security Planning Guide - Page 0009.html
Cloud Computing Security Planning Guide - Page 0010.html
Cloud Computing Security Planning Guide - Page 0011.html
Cloud Computing Security Planning Guide - Page 0012.html
Cloud Computing Security Planning Guide - Page 0013.html
Cloud Computing Security Planning Guide - Page 0014.html
Cloud Computing Security Planning Guide - Page 0015.html
Cloud Computing Security Planning Guide - Page 0016.html
Cloud Computing Security Planning Guide - Page 0017.html
Cloud Computing Security Planning Guide - Page 0018.html
Cloud Computing Security Planning Guide - Page 0019.html
Cloud Computing Security Planning Guide - Page 0020.html
Cloud Computing Security Planning Guide - Page 0021.html

A javascript error just appeared or you do not have installed a Flash Player plugin in your browser.

Prestimedia, your interactive publications solution provider, invites you to download the latest Adobe Flash plugin by clicking here

This e.print interactive catalogue is made by Prestimedia