What is "encryption at rest" and "encryption in transit," and why both matter?

Prepare for the Cybercrime Test with comprehensive coverage of real-world scenarios, various security domains, and expert techniques. Enhance your knowledge with flashcards and extensive question explanations. Ace your exam confidently!

Multiple Choice

What is "encryption at rest" and "encryption in transit," and why both matter?

Explanation:
Encryption at rest protects data when it is stored on physical media—like hard drives, SSDs, backups, or databases—so that even if someone gains access to the storage, they cannot read the data without the decryption key. Encryption in transit protects data as it moves across networks, such as between your device and a server, using protocols like TLS to prevent eavesdropping and tampering while the data is in motion. Both matter because they defend data at different points in its life cycle. If you only encrypt data at rest, the information could be exposed during transmission. If you only encrypt in transit, stored data remains readable if the storage is compromised. Applying both provides defense in depth, helping maintain confidentiality (and, with properly chosen techniques, integrity) across storage and transmission. In practice, you’ll see encrypted disks or database encryption for data at rest and TLS/HTTPS, VPNs, or other secure channels for data in transit. The note about encryption sometimes making investigations more complex reflects a real-world trade-off: strong encryption can hinder unauthorized access, so proper key management and incident response planning are essential to balance security with forensics and accessibility needs.

Encryption at rest protects data when it is stored on physical media—like hard drives, SSDs, backups, or databases—so that even if someone gains access to the storage, they cannot read the data without the decryption key. Encryption in transit protects data as it moves across networks, such as between your device and a server, using protocols like TLS to prevent eavesdropping and tampering while the data is in motion.

Both matter because they defend data at different points in its life cycle. If you only encrypt data at rest, the information could be exposed during transmission. If you only encrypt in transit, stored data remains readable if the storage is compromised. Applying both provides defense in depth, helping maintain confidentiality (and, with properly chosen techniques, integrity) across storage and transmission.

In practice, you’ll see encrypted disks or database encryption for data at rest and TLS/HTTPS, VPNs, or other secure channels for data in transit. The note about encryption sometimes making investigations more complex reflects a real-world trade-off: strong encryption can hinder unauthorized access, so proper key management and incident response planning are essential to balance security with forensics and accessibility needs.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy