Data exists in several states, each requiring different security considerations. Evaluate the following items and select which data state presents the greatest encryption challenge.
Data in use
Data in transit
Data in motion
Data at rest