1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Hashing
A cryptographic operation that transforms data into a fixed length string of characters ex. SHA -1, SHA - 256, SHA-3
Obfuscation
Making data or code more difficult to understand or analyze
Steganography
A method of hiding secret information within non-secret data, such as images, audio files, or text, to conceal the very existence of the hidden message
Tokenization
A method to convert sensitive data, such as credit card numbers personal information, into non-sensitive tokens
Dara masking
A protection technique that replaces sensitive information while preserving its format and reducing the risk of exposure or unauthorized access