Select appropriate authentication and authorization mechanisms. Design, implement and troubleshoot key management and use. Design and implement a data encryption solution for data at rest and data in transit.
Data Source: Unified Global Standards (ISCED, ISCO, O*NET, ESCO)