Threat

Description

Solution

Technologies

Plain text document captured during data transportation

Non encrypted data sent between two end machines that are communication, may be captured by an attacker.

The solution resides to use a strong encryption algorithm (3DES or RSA).

Use RSA private and public keys. A key size of 2048 bits is an excellent choice.

Non encrypted and Saved sensitive data

An attacker that works for an organization that produces and has access to sensitive data may use this advantage to attack the information system.

The solution resides in encrypting sensitive data first, then save them in the storage system. The use of a strong encryption algorithm (3DES or RSA) is recommended.

Use RSA private and public keys. A key size of 2048 bits is an excellent choice.