I need to answer this discussion.Please include references.
Securing Distributed Data
Field sales people can have a sales database on their smart phones. The sales database contains sensitive, competitive information. Using their smart phones, the salespeople can query the data, update it, delete it, and place orders. This application uses both warehouse and operational data.
In this Discussion, propose a strategy to make the data available and secure. Recommend a method of access control and integrity control, and defend your choices.
Post a response by Day 3. Then, read a selection of your colleagues’ postings. By Day 6, select two of your classmatesâ€™ postings that differ from some or all of your choices. Evaluate whether your colleagues have made a valid argument for the answers to each question. Offer constructive feedback, citing your reasons using the textbook or other research sources.