A new company policy requires hardware encryption for certain highly confidential systems. These existing systems do not already have a hardware component that can provide this functionality. What is the easiest way to implement this new policy?
Hardware Security Module
Trusted Platform Module
|Architecture and Design|
|Operations and Incident Response|
|Governance, Risk, and Compliance|
|Attacks, Threats, and Vulnerabilities|