A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

3 Types of Data State

 , updated on
A data state describes the different modes whereby data is used by computing equipment. The term applies to information security and efforts to encrypt data in each state. There are a total of three basic data states:

Data in Rest

Data that is stored for later use. This generally refers to data in a database or file that functions as system, application, user or backup data. Such data is physically stored on a data storage device such as a hard drive that may be located locally or on remote infrastructure such as a cloud service. It is common to encrypt all data in rest. For example, an entire hard drive may be encrypted and data may be encrypted at the file, database or data item level.

Data in Use

Data that has been pulled into memory or that is currently being processed. For example, user profile data that is stored in the memory of a phone to provide an API to apps. Data in use is the most difficult type of data to encrypt because this is the most likely to impact performance. Such data may be accessed many times as the user is waiting for a response from an application. In the past, data in use was often not encrypted. Some modern hardware supports encrypting data stored in memory or data being processed by a CPU.

Data in Transit

Data that is being sent over a network or a local transfer between devices. Data in transit may traverse public networks where it can easily be acquired by a malicious entity. As such, it is very common to encrypt data in transit. For example, a session between a web server and a user device is often encrypted with a protocol known as HTTPs.
Overview: Data States
Type
Definition
Modes whereby data is used by computing equipment known as data in rest, data in use and data in transit.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Data Security

A list of common data security techniques.

Data Remanence

An overview of data remanence.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Masking vs Redaction

The difference between data masking and redaction.

Degaussing

A definition of degaussing as a data security technique.

Data Control

A definition of data control with examples.

Personal Data

Examples of the common types of personal data.

Cybersecurity Risk

An overview of cybersecurity risk at the organizational level.

Confidential Information

An overview of confidential information with examples.

Encryption Examples

A definition of encryption with examples.

Asymmetric vs Symmetric

The differences between asymmetric and symmetric encryption.

Random Seed

The definition of random seed with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map