Traditional methods of securing data—such as perimeter defenses and endpoint antivirus—aren’t sufficient on their own, ...
After a user has been authenticated, sensitive data can be encrypted to prevent eavesdropping (see cryptography). THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction requires permission.