Explanation should include
- secure design principles
- security mechanisms
- examples of how data can be protected when in the following states:
- Data at rest
- authentication (e.g., passwords, biometrics)
- encryption
- permissions
- backups
- perimeter security (e.g., firewall, virtual private network [VPN])
- Data in transit (e.g., cryptography)
- Data being processed