Ensuring Security To Data In Different States

Describe how to ensure security to data in motion, data in use, and data at rest.