obfuscation
taking something simple and making it difficult to understand. It usually involves making data difficult to understand to attackers.
gain access to original data
what benefit does a hacker gain by knowing he obfuscation process
1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
obfuscation
taking something simple and making it difficult to understand. It usually involves making data difficult to understand to attackers.
gain access to original data
what benefit does a hacker gain by knowing he obfuscation process
Steganography
obfuscation method that involves hiding data within a file
if the method of hiding that was known, anyone can access it
why is Steganography not always effective
covertext
term for document that contains the data hidden through steganography
images, audio, video, machine identification codes, and TCP packets traversing a network
types of media types to hide data through steganography
it sends the data in bits and rearranges it once it reaches the destination.
how does steganography through TCP packets traversing a network work
machine identifcation codes
steganography method involving yellow dots added to a piece of paper by a printer hide data. The dots are usually hard to see.
tokenization
obfuscation method that involves replace confidential with a token of the data.
creating token of SSN and credit card numbers when paying with mobile
examples of tokenization where tokens are sent across a network in lieu of actual data
credit is registered to phone, server provides a set of tokens stored in phone, the tokens are used during the payment process, token service server matches token to card, token is discarded.
tokenization process of mobile payments
once
how many times can tokens created by tokenization be used?
data masking
obfuscation involving hiding parts of data
asterisk used to hide all numbers of a credit card number on a receipt except the last four
example of data masking