O'Reilly logo

Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Data masking

Another method that can be used to render data unusable but recognizable is data masking. This method is commonly used in processes where there is human interaction. An example would be looking at your stored credit card information at an online retailer. Typically, your credit number will be masked (series of asterisks) except for the last four digits, so you can identify the card stored while not divulging the full number. This is done so that if your account is compromised, the number is not there to be stolen and used for fraudulent purchases. A similar method can be achieved in database views and specialized encryption solutions to enforce the least privilege and access only on a need-to-know basis.

This solution has pros and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required