Security Architecture: Methods of Securing Data Flashcards
What is geographical restrictions?
Geographic restrictions: Refers to constraining data to certain aspects of the organization’s geography.
Sovereignty
Geofence
Encryption
Encryption: Converts plain text, which is human-readable data, to cipher text.
Works on confidentiality
Hashing
Hashing: Creates a hash that can be compared to the hash on another system, to help guarantee data integrity.
Involves data integrity by comparing different values which needs to match to determine if it is tampered or not by hashing algorithm.
Masking
Masking: Obfuscates original, sensitive data with realistic but fictitious information to protect its confidentiality while maintaining its usability for testing or analytical purposes. One method of obfuscate.
Masking process: (credit card or audit type systems used this)
Tokenization
Tokenization: Substitutes sensitive data with unique symbols or tokens, thereby helping to reduce the risk of exposure and helping maintain security during transactions or data storage.
Another way to obfuscate
Token Process (substitute the character with other characters)
Reversable and non reversable:
6 will represent number 3 and build that method (reversable)
Non-Reversable is like masking but not completely masking
Obfuscation
Obfuscation: Refers to the practice of intentionally making something unclear, confusing, or difficult to understand. This method is often applied to code, text, or information to protect it from unauthorized access or reverse engineering.
Methods: Masking or Tokenization
Segmentation
Segmentation: Refers to the practice of dividing a computer network into smaller, isolated segments to enhance security, control access, and contain potential breaches or threats.
- VLAN