How does data flow? Where is it most secure? What are the differences within a technical system as it relates to data in a computer system-across a network?

Data at Rest, In Use, and in Transmission

Assessment Description:

Understanding the complexities of data transmission and how it relates to the information technology field is a key foundation to understanding the digital world. How does data flow? Where is it most secure? What are the differences within a technical system as it relates to data in a computer system and across a network?

Assignment:

Write a 250 – 350-word lecture for novoice cybersecurity students, addressing the following:

1) Discuss the difference in data at rest, in use, and in transmission.

2) Explain how you would secure the data.

3) Describe how the strategy changes, and when it’s in use, at rest, or in transit.

Explain each of the three in clear detail as if you are addressing new students to cybersecurity.