Section 8.79 Obfuscation Flashcards

Objectives 1.4 Explain the importance of using appropriate cryptographic solutions. Objectives 2.3 Explain various types of vulnerabilities. Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity.

1
Q

Obfuscation Techniques in Data Security

Steganography

A

● Conceals a message within another to hide its very existence

● Involves altering image or data elements to embed hidden information

● Primary goal is to prevent the suspicion that there’s any hidden data at all

● Used alongside encryption for added security

● Detection is challenging due to hiding data in plain sight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Obfuscation Techniques in Data Security

Tokenization

A

● Substitutes sensitive data with non-sensitive tokens

● Original data securely stored elsewhere

● Tokens have no intrinsic value

● Reduces exposure of sensitive data during transactions

● Commonly used for payment systems to comply with security standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Obfuscation Techniques in Data Security

Data Masking (Data Obfuscation)

A

● Disguises original data to protect sensitive information

● Maintains data authenticity and usability

● Used in testing environments, especially for software development

● Reduces the risk of data breaches in non-production settings

● Common in industries handling personal data

● Masks portions of sensitive data for privacy, e.g., credit card digits, social security numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly