Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Your Guide To Understanding Various Types of Data Masking
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Your Guide To Understanding Various Types of Data Masking
Big DataExclusiveSecurity

Your Guide To Understanding Various Types of Data Masking

Matt James
Matt James
4 Min Read
types of data masking
Shutterstock Licensed Photo - By whiteMocca
SHARE

?Google Search Reveals Community College Student?s Social Security Number.? While this may seem like a headline you would find on sites like The Onion, this is something that actually happened. This situation occurred when staff members at a community college started to test a new type of online application that utilized files full of sensitive and unaltered data on a server that was not secure. Even though this is an example that?s somewhat severe, if unmasked production data is used for test or development environments, serious issues can arise. To effectively prevent the possibility of exposing personal addresses, payroll information, Social Security numbers and other sensitive and private data to the wrong (potentially nefarious) individuals, developers should utilize datasunrise dynamic data masking. Have you heard of data masking? It?s a phrase that refers to data alterations from its original state to make sure it stays protected.

Contents
  • Lookup Substitution Process
  • Encryption
  • Redaction Method
  • Shuffling
  • Conclusion

Lookup Substitution Process

The Problem:

Think about any type of case where you have a database full of the Social Security information for your employees. This is information that should not be found in any type of testing environment. The Solution: A lookup table can be added in the production environment that can provide an alias for the specific value, limiting anyone?s access to the sensitive information. The Result: When this method is used, the testing environment isn?t populated with the sensitive information, however, it is still filled with realistic information/data.

Encryption

The Problem:

More Read

Why 2015 Will Be Year of Big Data: Oracle’s Five Predictions
The Overlooked Key to Enterprise-Scale Internet of Things Adoption
Cloud Technology: the Cornerstone of a Small Business’s Online Presence
Big Data and Hadoop Development 2016
The Importance Of Creating A Single View of The Customer With Data

This is when the same issue mentioned above is present. However, here, rather than a lookup table, it?s eliminated because it could be compromised. The Solution: To fix this, the data can be encrypted. Only the people who actually need to see this information will be given the password that makes it readable. Encryption is a popular method used by changing the provided information into an unreadable format. This is one with the use of complex algorithms, which makes the data completely undecipherable until it is decrypted. The Result: Anyone who needs to have access to the data is given the password and those who don?t have this password can?t gain access to it. Keep in mind, if encryption is being used without any type of other data masking method, then the sensitive information can be instantly viewed once it is decrypted.

Redaction Method

The Problem:

With this situation, it would be if you had a list of customer credit card numbers. Because of the sensitivity of the information, it isn?t needed in a development or testing environment. The Solution and Possible Results: In this case, sensitive data can be substituted with a generic value. In most cases, this is typically only something that should be an option if the value isn?t needed for any type of development or QA purposes.

Shuffling

The Problem:

In some situations, you may have some sensitive data that has to be protected, but unique values are also needed. For example, does the QA team need to verify pertinent information, such as the annual summary amount matching what?s set aside for salaries? The Solution: With shuffling, the annual salaries are scrambled from the initial employee. The Result: Employees can see the created salaries table with the values but can?t tell which one belongs to which employee.

Conclusion

As you can see, there are several methods that can be used to mask data and ensure it isn?t expected to nefarious individuals who may use it for dishonest purposes.

TAGGED:cybersecuritydatadata masking
Share This Article
Facebook Pinterest LinkedIn
Share
ByMatt James
Matt James is a veteran marketer & tech geek that has helped many large brands increase their online footprint. He specializes in influencer outreach and business growth.

Follow us on Facebook

Latest News

payment methods
How Data Analytics Is Transforming eCommerce Payments
Business Intelligence
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security
ai for making lyric videos
How AI Is Revolutionizing Lyric Video Creation
Artificial Intelligence Exclusive
intersection of data and patient care
How Healthcare Careers Are Expanding at the Intersection of Data and Patient Care
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Your Personal Data: Wither Privacy? Take Stephen Baker’s Poll

2 Min Read
HIPPA compliance
Best PracticesBig DataData ManagementInside CompaniesITLocationPolicy and GovernancePrivacySecurity

HIPAA Breach Lessons Learned

5 Min Read
Data Science
Best PracticesCloud ComputingData Management

The Evolution Of Data Science In The Cloud

5 Min Read
Ethereum cryptocurrency
AnalyticsBlockchainExclusivePredictive Analytics

Is Predictive Analytics Setting The Stage For An Ethereum Price Increase?

9 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?