_____ can render data useless to unauthorized users who might have violated some of the database security layers

Average Rating
0 out of 5 stars. 0 votes.

_____ can render data useless to unauthorized users who might have violated some of the database security layers

Data encryption