A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

3 Examples of Data In Use

 , updated on
Data in use is data that is stored in memory or that is actively being processed by computing equipment. It is one of the three data states, a concept that is used for information security to identify places where data should be encrypted. Data in use is particularly difficult to encrypt because it is actively being processed such that its encryption may impact performance. Nevertheless, it is possible to encrypt data in use as this can be supported at the hardware level. The following are illustrative examples of data in use.

Memory

Data stored in memory by a system, application or database. For example, a user views their transaction history on a banking website and this information is stored by their web browser in memory.

Processing

Data that is processed by computing equipment, particularly CPUs. For example, a user submits a transaction to a bank and the bank processes the customer's account number as part of a transaction authentication algorithm.

User Input

Data is captured by an input device such as a keyboard, transfered to memory and processed by a CPU. In theory, data could be intercepted by a malicious entity at any stage in this process.
Overview: Data In Use
Type
Definition
Data that is stored in memory or that is actively being processed by computing equipment.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Data Security

A list of common data security techniques.

Data Remanence

An overview of data remanence.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Masking vs Redaction

The difference between data masking and redaction.

Degaussing

A definition of degaussing as a data security technique.

Data Control

A definition of data control with examples.

Data States

An overview of the three data states.

Personal Data

Examples of the common types of personal data.

Cybersecurity Risk

An overview of cybersecurity risk at the organizational level.

Confidential Information

An overview of confidential information with examples.

Encryption Examples

A definition of encryption with examples.

Asymmetric vs Symmetric

The differences between asymmetric and symmetric encryption.

Random Seed

The definition of random seed with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map