Identification should include
- data in transit
- data in use
- data at rest.
Process/Skill Questions:
- What are the examples of the different states of data?
- How do the cryptographic needs of different states of data differ from each other?
- What is the primary security concern for data in transit compared to data at rest?