Looking for trustworthy answers? Westonci.ca is the ultimate Q&A platform where experts share their knowledge on various topics. Explore our Q&A platform to find in-depth answers from a wide range of experts in different fields. Our platform provides a seamless experience for finding reliable answers from a network of experienced professionals.
Sagot :
The option that is an example of sensitive data that would warrant the database being encrypted and protected with a password is option b. Insecure cryptographic storage
What is sensitive data?
They are Information that requires protection from unauthorized exposure is known as sensitive data. In addition to PII (Personally Identifiable Information), PHI (Protected Health Information), and other information, it can be in written or electronic form.
Personal information, commercial information, and classified information are the three main categories of sensitive data that hackers and hostile insiders typically target.
Therefore, in the context of the above, The storage of encryption keys should be done whenever it is possible. This requires the use of at least two distinct keys: Data is encrypted using the DEK, or Data Encryption Key. To encrypt the DEK, one must utilize the Key Encryption Key (KEK).
Learn more about cryptographic storage from
https://brainly.com/question/29601983
#SPJ1
See options below
a. Broken authentication and session management
b. Insecure cryptographic storage
c. Insecure communications
d. Failure to restrict URL access
We hope you found this helpful. Feel free to come back anytime for more accurate answers and updated information. We appreciate your visit. Our platform is always here to offer accurate and reliable answers. Return anytime. Westonci.ca is committed to providing accurate answers. Come back soon for more trustworthy information.