| |
Data in use is data that is stored in memory or that is actively being processed by computing equipment. It is one of the three data states, a concept that is used for information security to identify places where data should be encrypted. Data in use is particularly difficult to encrypt because it is actively being processed such that its encryption may impact performance. Nevertheless, it is possible to encrypt data in use as this can be supported at the hardware level. The following are illustrative examples of data in use.
MemoryData stored in memory by a system, application or database. For example, a user views their transaction history on a banking website and this information is stored by their web browser in memory.ProcessingData that is processed by computing equipment, particularly CPUs. For example, a user submits a transaction to a bank and the bank processes the customer's account number as part of a transaction authentication algorithm.
User InputData is captured by an input device such as a keyboard, transfered to memory and processed by a CPU. In theory, data could be intercepted by a malicious entity at any stage in this process.|
Type | | Definition | Data that is stored in memory or that is actively being processed by computing equipment. | Related Concepts | |
Information Security
This is the complete list of articles we have written about information security.
If you enjoyed this page, please consider bookmarking Simplicable.
© 2010-2023 Simplicable. All Rights Reserved. Reproduction of materials found on this site, in any form, without explicit permission is prohibited.
View credits & copyrights or citation information for this page.
|