Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Your Guide To Understanding Various Types of Data Masking
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Your Guide To Understanding Various Types of Data Masking
Big DataExclusiveSecurity

Your Guide To Understanding Various Types of Data Masking

Matt James
Matt James
4 Min Read
types of data masking
Shutterstock Licensed Photo - By whiteMocca
SHARE

?Google Search Reveals Community College Student?s Social Security Number.? While this may seem like a headline you would find on sites like The Onion, this is something that actually happened. This situation occurred when staff members at a community college started to test a new type of online application that utilized files full of sensitive and unaltered data on a server that was not secure. Even though this is an example that?s somewhat severe, if unmasked production data is used for test or development environments, serious issues can arise. To effectively prevent the possibility of exposing personal addresses, payroll information, Social Security numbers and other sensitive and private data to the wrong (potentially nefarious) individuals, developers should utilize datasunrise dynamic data masking. Have you heard of data masking? It?s a phrase that refers to data alterations from its original state to make sure it stays protected.

Contents
  • Lookup Substitution Process
  • Encryption
  • Redaction Method
  • Shuffling
  • Conclusion

Lookup Substitution Process

The Problem:

Think about any type of case where you have a database full of the Social Security information for your employees. This is information that should not be found in any type of testing environment. The Solution: A lookup table can be added in the production environment that can provide an alias for the specific value, limiting anyone?s access to the sensitive information. The Result: When this method is used, the testing environment isn?t populated with the sensitive information, however, it is still filled with realistic information/data.

Encryption

The Problem:

More Read

Guest Interview with Chris Rasmussen: Looking at Government 2.0 Social Tools
A New Economy of Data
Harnessing Artificial Intelligence for Mental Health Management
4 Ways Big Data Has Made Bluetooth A Terrifying Security Risk
#18: Here’s a thought…

This is when the same issue mentioned above is present. However, here, rather than a lookup table, it?s eliminated because it could be compromised. The Solution: To fix this, the data can be encrypted. Only the people who actually need to see this information will be given the password that makes it readable. Encryption is a popular method used by changing the provided information into an unreadable format. This is one with the use of complex algorithms, which makes the data completely undecipherable until it is decrypted. The Result: Anyone who needs to have access to the data is given the password and those who don?t have this password can?t gain access to it. Keep in mind, if encryption is being used without any type of other data masking method, then the sensitive information can be instantly viewed once it is decrypted.

Redaction Method

The Problem:

With this situation, it would be if you had a list of customer credit card numbers. Because of the sensitivity of the information, it isn?t needed in a development or testing environment. The Solution and Possible Results: In this case, sensitive data can be substituted with a generic value. In most cases, this is typically only something that should be an option if the value isn?t needed for any type of development or QA purposes.

Shuffling

The Problem:

In some situations, you may have some sensitive data that has to be protected, but unique values are also needed. For example, does the QA team need to verify pertinent information, such as the annual summary amount matching what?s set aside for salaries? The Solution: With shuffling, the annual salaries are scrambled from the initial employee. The Result: Employees can see the created salaries table with the values but can?t tell which one belongs to which employee.

Conclusion

As you can see, there are several methods that can be used to mask data and ensure it isn?t expected to nefarious individuals who may use it for dishonest purposes.

TAGGED:cybersecuritydatadata masking
Share This Article
Facebook Pinterest LinkedIn
Share
ByMatt James
Matt James is a veteran marketer & tech geek that has helped many large brands increase their online footprint. He specializes in influencer outreach and business growth.

Follow us on Facebook

Latest News

ai in video game development
Machine Learning Is Changing iGaming Software Development
Exclusive Machine Learning News
media monitoring
Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
Analytics Exclusive Infographic
data=driven approach
Turning Dead Zones Into Data-Driven Opportunities In Retail Spaces
Big Data Exclusive Infographic
smarter manufacturing
Connecting the Factory Floor: Efficient Integration for Smarter Manufacturing
Infographic News

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Three Healthcare IT trends 2013
Uncategorized

Three Healthcare IT Trends for 2013

4 Min Read
VPN data security
Data ManagementExclusivePrivacySecurity

How Big Data Provides A Pivotal Foundation For VPN Data Security

6 Min Read
Big Data and Sales
Data VisualizationWeb Analytics

Big Data Can Help You Amplify Your Sales In 2019

5 Min Read
mobile secure payments
ExclusiveMobilitySecurity

How Secure Are The Most Popular Mobile Payment Methods?

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
ai is improving the safety of cars
From Bolts to Bots: How AI Is Fortifying the Automotive Industry
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?