Ensuring Security To Data In Different StatesUncategorized / By Brian Leakey Describe how to ensure security to data in motion, data in use, and data at rest.