Discuss encryption and how it is used to protect data at rest (i.e., storage).
- Introduce the concept of encryption.
- Describe the THREE states of data in an information processing system.
- Discuss the advantages and disadvantages of encrypting data at rest.
- Why should IT professionals be concerned with encrypting data?
- Conclude with your recommendation of an encryption policy to your organization.