5. obfuscation

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Get a hint
Hint

obfuscation

Get a hint
Hint

taking something simple and making it difficult to understand. It usually involves making data difficult to understand to attackers.

Get a hint
Hint

gain access to original data

Get a hint
Hint

what benefit does a hacker gain by knowing he obfuscation process

Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

obfuscation

taking something simple and making it difficult to understand. It usually involves making data difficult to understand to attackers.

2
New cards

gain access to original data

what benefit does a hacker gain by knowing he obfuscation process

3
New cards

Steganography

obfuscation method that involves hiding data within a file

4
New cards

if the method of hiding that was known, anyone can access it

why is Steganography not always effective

5
New cards

covertext

term for document that contains the data hidden through steganography

6
New cards

images, audio, video, machine identification codes, and TCP packets traversing a network

types of media types to hide data through steganography

7
New cards

it sends the data in bits and rearranges it once it reaches the destination.

how does steganography through TCP packets traversing a network work

8
New cards

machine identifcation codes

steganography method involving yellow dots added to a piece of paper by a printer hide data. The dots are usually hard to see.

9
New cards

tokenization

obfuscation method that involves replace confidential with a token of the data.

10
New cards

creating token of SSN and credit card numbers when paying with mobile

examples of tokenization where tokens are sent across a network in lieu of actual data

11
New cards

credit is registered to phone, server provides a set of tokens stored in phone, the tokens are used during the payment process, token service server matches token to card, token is discarded.

tokenization process of mobile payments

12
New cards

once

how many times can tokens created by tokenization be used?

13
New cards

data masking

obfuscation involving hiding parts of data

14
New cards

asterisk used to hide all numbers of a credit card number on a receipt except the last four

example of data masking