An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the company’s business.

An intruder with malicious intent breaks into an office and steals a hard drive

containing sensitive information about the company’s business. However, when
attempting to access the drive’s contents, the intruder is met with the company’s
authentication protocols and data encryption measures. What type of security is
illustrated in this example?
Product Security
Data Security
Governance
Cyber Intelligence


Leave a Reply

Your email address will not be published. Required fields are marked *