Threat | Description | Solution | Technologies |
Plain text document captured during data transportation | Non encrypted data sent between two end machines that are communication, may be captured by an attacker. | The solution resides to use a strong encryption algorithm (3DES or RSA). | Use RSA private and public keys. A key size of 2048 bits is an excellent choice. |
Non encrypted and Saved sensitive data | An attacker that works for an organization that produces and has access to sensitive data may use this advantage to attack the information system. | The solution resides in encrypting sensitive data first, then save them in the storage system. The use of a strong encryption algorithm (3DES or RSA) is recommended. | Use RSA private and public keys. A key size of 2048 bits is an excellent choice. |