Obfuscation Flashcards
Steganography
Concealing data within other data to hide its existence.
Tokenization
Substituting sensitive data with non-sensitive placeholders.
Data Masking
Concealing or anonymising specific data elements within a dataset.
Hashing
Generating a fixed-size, unique hash value from input data using cryptographic algorithms.
Salting
Adding random data to input before hashing to prevent identical inputs from producing the same hash.
Digital Signatures
Cryptographic signatures that verify the authenticity and integrity of digital messages or documents.
Key Stretching
Technique to increase the computational effort required to derive keys from passwords.
Blockchain
Distributed, decentralised ledger technology used for secure and transparent record-keeping.
Open Public Ledger
Transparent and publicly accessible record of transactions or data entries.