Learn about three states of data and why individuals and organizations need to consider the protection and destruction of portable data.
- [Narrator] Data is considered in use when it is being created, captured, or processed. Processes can be driven by user decisions, and is thus discretionary, such as when you format a document or perform calculations in a spreadsheet. With the advent of cloud-based applications, data in use increasingly exists as data in transit as well. Applications, and thus processes, may be automated. This is the case, for example, when your device connects to its command and control, or C&C, server to update your software, or when it connects to a GPS satellite to calculate how far you've walked, kind of like E.T. phoning home to his alien planet in the 1982 Stephen Spielberg movie.
That phoning home is one example of data in transit that is automated. The bits and bytes of data, the records of where we've been, or how far our car has driven, or what our blood pressure is now may be sent automatically to a data collection server somewhere. The communication might be for some use that we have agreed to with full understanding. At other times, not so much. We will talk in a later lesson about apps for mobile devices that record and send our data back to the app developer.
When our apps send our data back to business partners or customers of app developers, we may not be able to control how that data is protected or stored. Another example of data in transit is, of course, the messages we intend to send and receive. The exception, of course, is those accidental sends that reply all when we really hadn't intended to. When we send our data, it typically does not go from point A to point B. It gets routed or handed off from one transmitter to another.
It's a relay system in which at least some of the relay stations capture our data and keep it at rest even after it has passed on to the next transfer point on the way to the final destination. On a daily basis, most of us don't think about whether our portable data is resting or in storage anywhere other than in our device, or with the person or device we sent it to. We will discuss how to protect our data when it is transit, and how to remove it from storage sites.
We will discuss the limits over what we can actually do with our data to manage it. In some instances, it may be less than you would hope. Historically, the largest data breaches have occurred with respect to data at rest. All the more reason to understand how to protect and destroy your portable data. In this lesson we talked about the different states of data: in use, in transit, and at rest. We also mentioned that there are limits to how much we can protect our portable data storage and whether we can, indeed, destroy it.
Next, we will discuss portable data storage as used personally by individuals, and how they can protect or destroy it.
This course was created and produced by Mentor Source, Inc. We are pleased to host this training in our library.