Uncategorized

Computer sciences and Information technology: Domain 2 – Asset Security

After reading this week’s materials, please respond to one or more of the following questions.

What is data remanence? Describe the four different approaches to eliminating data remanence: overwriting, degaussing, encryption, and physical destruction.
Describe what data leak prevention (DLP) is and compare the benefits and drawbacks of network DLP, endpoint DLP, and hybrid DLP.