Blog
Uncategorized
Computer sciences and Information technology: Domain 2 – Asset Security
After reading this week’s materials, please respond to one or more of the following questions.
What is data remanence? Describe the four different approaches to eliminating data remanence: overwriting, degaussing, encryption, and physical destruction.
Describe what data leak prevention (DLP) is and compare the benefits and drawbacks of network DLP, endpoint DLP, and hybrid DLP.
