Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.
Linwood
4 months agoBulah
4 months agoRodney
4 months agoTyisha
4 months agoNan
5 months agoMelynda
5 months agoLeota
5 months agoZita
5 months agoIzetta
5 months agoBlythe
5 months agoRasheeda
5 months agoCristal
5 months agoLajuana
5 months agoTelma
5 months ago