1/4
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Obfuscation
Make data hard to understand (Hide Data)
Can decipher if known how to read
Steganography
Hide data within an image
Common Steganography Tech
Network Based
Message through TCP packets
Image
Embed message in image
Invisible Watermarks
Yellow dots on printer
Audio
Secret message in audio
Video
Manage signal to noise ratio
Tokenization
Make sensitive data to a token (Non-sensitive placeholder)
Ex:
Credit Card payment
Token is created on use, but then deleted after
Encryption/Hashing unneeded
Dat Masking
Hide original data
Protects PII
Techniques:
Substituting
Shuffling
Encryption
etc