From the course: Securing Your Home Office

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Data security

Data security

From the course: Securing Your Home Office

Start my 1-month free trial

Data security

- [Instructor] While the physical security of a home office is important, there's another security aspect to consider as well, and that's data security. And we can think about the security of data in two categories, data that's currently being used, and data that's not currently being used. While these both require security, the methods we use to secure them are a little bit different. Data that's being used, active data, could be open files or files that aren't open, but are on a disk that's mounted and ready to be used. And this kind of data is protected by our actions and by software security features. Inactive data, files that are stored on an unmounted disk should be protected from unauthorized access through encryption, and we'll take a look at that in a moment. Files on a mounted disk are generally accessible by the operating system and by software running on the operating system. Here malware or malicious software…

Contents