Protecting Data (Methods) 3.3 Flashcards
One way to secure data is to have […] restrictions
- Identify based on IP subnet (harder with mobile devices)
- 802.11
- GPS
Geographic
[…] allows you to automatically allow or restrict access to the network based on the physical location of the device
Geofencing
An integral part of protecting data, […], allows you to encode information into unreadable data, unless it is […]
- Plain text —> Ciphertext
Encryption
Decrypted
Another way to protect data, called […], allows you to represent data as a short string of text (Message digest / Fingerprint). It is impossible to recover the original message from the […]
Hashing
Hash
Hashing is used to verify the […] of data, ensuring what you downloaded is the same as the original
Integrity
Another way to protect data is through […], which is the process of making easily digestible information much harder to understand (To Humans)
Ex:
A developer makes his perfectly readable code into nonsense, but it still functions the same
Obfuscation
A type of obfuscation, called […], is used to protect PII and other sensitive data by blocking out certain parts of it
Ex:
Bank Card
****3567
Masking
Another way to protect data is through […], which replaces sensitive data with a non-sensitive placeholder. Very common with credit card processing
Ex:
Use a temporary […] during payment, so if an attacker captures the cc numbers they won’t be able to use it
Tokenization
Token
[…] protects your data by not having it all in a single location. If it was all at a single location, one breach would put all of it at risk.
Also allows you to have stronger or weaker security for data of different sensitivity
Segmentation
Tied to whatever account is being used to login, […] allows you to control its access to resources.
Permission Restrictions