Which of the following is a challenge of protecting data in use?

Prepare for the WGU ITAS2110 D430 Fundamentals of Information Security Exam. Study with quizzes and flashcards featuring comprehensive questions and hints!

Protecting data in use presents unique challenges, one of which is that legitimate access by users complicates protection. In environments where users need to interact with data, maintaining security becomes more complex because while you want to allow authorized users to access the data they need for their work, you also have to ensure that this access doesn’t inadvertently lead to a breach or misuse of sensitive information.

When users have access to data, there is always the risk of that data being intercepted, mismanaged, or mishandled. This is particularly true in scenarios where data is processed in environments that may not have robust security measures, making it difficult to ensure that only authorized actions are performed. Control measures need to balance usability with security, which can lead to challenges such as implementing appropriate access controls, ensuring that users are trained in data handling, and monitoring for any suspicious activity.

In contrast, the options regarding encryption, preventing unauthorized access, and automatic backups suggest mechanisms that enhance security and data retention but do not directly address the real-time challenges faced when data is actively in use by legitimate users.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy