Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?
The greatest concern to an IS auditor reviewing an organization's method to transport sensitive data between offices should be the use of asymmetric encryption algorithms. Asymmetric encryption algorithms are a type of encryption that uses two different keys, one public and one private, to encrypt and decrypt data. The public key is used to encrypt the data and the private key is used to decrypt it. This system is more secure than other methods, such as 128-bit encryption, as it ensures that only the sender and receiver of the data are able to access the data. However, this system can be vulnerable to attacks if the keys are not properly secured.
Leonida
11 months agoFreeman
10 months agoBulah
10 months agoNidia
10 months agoBobbye
11 months agoLai
11 months agoThea
11 months agoDonette
9 months agoVeronika
9 months agoHannah
9 months agoQuentin
9 months agoDong
9 months agoShaun
11 months agoMalcom
11 months agoZana
11 months agoMargurite
12 months agoCarole
12 months agoFelix
11 months agoJenise
11 months agoJarod
11 months agoArmando
11 months ago