Read the book CISSP All-in-One Study Guide and can refer to this URL
https://www.soterosoft.com/blog/data-in-use-encryption-data-in-motion-encryption/
data-in-use - Encryption doesn’t protect data in use. Data-in-use meaning the data already view example displaying your bank account information at your screen.
The data is encrypted at the source (Data-at-rest encryption), the data is encrypted via TLS or HTTPS when in motion. But when it reaches your computer or mobile devices, the data storing in your RAM, CPU registeres and display on your screen. All these are not encrypted, else how you read the data or information?? Data must decrypt before it is used. So for data-in-use, best approach is access control but that doesnt stop people from screen-shot and print it etc etc. So the obvious answer is B.
B is correct but I'd just like to add that with Homomorphic encryption the data in use is protected as well. Homomorphic encryption is a form of encryption that permits users to perform computations on its encrypted data without first decrypting it.
The correct answer according to CISSP is: B. When the data is being viewed, it can only be printed by authorized users. Data-in-use controls are a type of security control that is designed to protect data when it is being accessed or used. These controls typically involve limiting the actions that can be performed on the data and enforcing access controls to ensure that only authorized users are able to view, modify, or print the data. This way, it ensures that only authorized users can print the data and not to anyone who has access to the data.
C. A protocol is a procedure, not necessarily referencing a method of encryption. Could be referencing a protocol for clean desk policy, or privacy screens.
when I read option C "it can be accessed using secure protocols.", I thought about access remotely over TLS which will be a correct answer. But the question does not mention remote access to the data.
So B should be the correct answer.
Answer is B. The question about the controls process. So, the answer should be very defined like example "it can only be printed by authorized users." Notice the word "only"?
it is C. Data-in-use must work always of course with secure protocols when the information is charged in the system. After that, the information can be decrypted or not (homomorphic encryption). As well, the information should be accessed from trusted system or "enclave"
I would say it's C > "Encryption plays a major role in protecting data in use or in motion. Data should always be encrypted when it's traversing any external or internal networks. This includes encrypting all data prior to transport or using protected tunnels, such as HTTPS or SSL/TLS."
https://www.techtarget.com/searchsecurity/feature/Best-practices-to-secure-data-at-rest-in-use-and-in-motion
It's not A, when you lose data in use you can decrypt them. Imagin that you are connected over TLS to your bank and you close the browser, can you reopen that, no you have to login again with secure protocol (TLS).
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
DracoL
Highly Voted 2 years, 1 month agojackdryan
1 year, 6 months agordy4u
2 years agoJamati
2 years agoCCNPWILL
Most Recent 5 months, 4 weeks agostack120566
8 months, 1 week agogjimenezf
10 months, 1 week agoKCLung
1 year, 1 month ago74gjd_37
1 year, 2 months agosyyt
1 year, 7 months agoDJOEK
1 year, 10 months agoevenkeel
1 year, 10 months agooudmaster
1 year, 11 months agorajkamal0
1 year, 11 months agoringoru
1 year, 11 months agoWiDeBarulho
2 years, 1 month agoRollizo
2 years, 1 month agokrassko
2 years, 2 months agoDERCHEF2009
2 years, 2 months agooudmaster
1 year, 11 months ago