answersLogoWhite

0


Best Answer

Encryption and the use of digital certificates.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How to implement security in transient data?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What security measures should you implement on your website to ensure customers data is protected?

One way to tell whether a website offers security to help protect your sensitive data is if they have a security certificate for the site matches the name of the site.


What is the opposite of persistent data?

The opposite of "persistent data" is "transient data".


Data classification is first designated by?

. Should you place your government laptop in checked baggage before a flight?


Explain The merits of using a deque to implement a stack in data structure?

Explain The merits of using a deque to implement a stack in data structure


What type of data must be handled and stored properly?

Sensitive or confidential data, such as personally identifiable information, financial information, and health records, must be handled and stored properly to protect individuals' privacy and prevent cyber security breaches. It is important to follow data protection regulations and implement security measures to safeguard this information from unauthorized access or disclosure.


What is data security?

Data security refers to the process of guarding data such as database from damaging forces and unwanted activities of unauthorized users. This is also called as information security.


When is in-depth security training required by law?

When a HAZMAT Employer must implement a security plan


How can a security framework assist in the design and implementation of a security infrastructure?

The security framework provides strategic direction to design and implement the security infrastructure. It also ensures the accomplishment of objectives.


What is data shield?

providing a security for your data


What type of physical security device can you implement to counter piggybacking?

man-trap


What has become more important because of the increased use of computers the Internet and WWW?

Data integrity and data security


What is most appropriate data structure to implement priority queue?

heap