Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.
Linwood
5 months agoBulah
6 months agoRodney
6 months agoTyisha
6 months agoNan
6 months agoMelynda
6 months agoLeota
6 months agoZita
6 months agoIzetta
6 months agoBlythe
6 months agoRasheeda
6 months agoCristal
6 months agoLajuana
6 months agoTelma
6 months ago