In information security practice, encryption is primarily associated with protecting which activity within computing environments?

Difficulty: Easy

Correct Answer: data communication

Explanation:


Introduction / Context:
Encryption converts readable data (plaintext) into an unreadable format (ciphertext) that can only be reversed by authorized parties. It is fundamental to confidentiality and integrity across networks and storage. This question asks where encryption is primarily applied in typical computing operations.


Given Data / Assumptions:

  • Common encryption contexts: in transit (network communications) and at rest (stored data).
  • Goal: prevent eavesdropping, tampering, or unauthorized disclosure.
  • Focus: the mainstream, most common application across users and systems.


Concept / Approach:

The most widespread use of encryption is in data communication (e.g., TLS for web traffic, VPN tunnels, secure email), protecting data while it traverses untrusted networks. While encryption can also apply to stored files (at rest) and specific application fields, the archetypal, daily application is securing data in transit between clients, servers, and services.


Step-by-Step Solution:

Identify the protection target most exposed to interception: network traffic.Map common solutions: HTTPS/TLS, SSH, IPsec, WPA3.Confirm that transaction entry and local processing rely more on access controls and input validation than encryption by default.Choose “data communication” as the primary encryption use case.


Verification / Alternative check:

Industry standards (TLS everywhere) and regulatory guidance emphasize encrypting data in transit across public and internal networks.


Why Other Options Are Wrong:

File retention: Retention policies govern retention periods, not encryption per se.

Transaction entry: Focuses on validation and authentication rather than encryption itself.

Computer processing: Data is typically decrypted for processing; encryption is not the processing mechanism.

None: Incorrect since encryption clearly applies to communications.


Common Pitfalls:

Conflating encryption at rest with retention or backups; they serve different controls and objectives.


Final Answer:

data communication

More Questions from Management Information Systems

Discussion & Comments

No comments yet. Be the first to comment!
Join Discussion