Computer Science, asked by shyamligupta6803, 1 year ago

In which technique masked data cannot be recovered?

Answers

Answered by Answers4u
0

Most small and big organizations around the world have a large volume of data that needs to be protected. This is done with an aim so that the data cannot be copied. The moment you have to use this data staring from development stage to testing stage, there are chances that it could be misused. This also increases further chances of data theft and data loss.

1. Data masking is one of the recent innovations that have emerged such that the data can be used safety within the nonproduction environment. This also proves helpful for any organization to meet the privacy regulations for data.

2. Protecting data is vulnerable as it may involve monitoring each and every action of the data inside out – watching as the data is being used. This is one of the most effective ways in which prompt action can be taken in case it is being misused.

3. So data masking certainly is one of the most effective ways to help protect valuable data against loss or theft, even when it is being copied to another source.

4. The process is done by ensuring that one way algorithm is being used to mask data. Under this condition the sensitive data is immediately replaced by data that is more realistic but not as same as real.



Answered by shoaibahmad131
0

Answer:

Most little and huge associations around the globe have a substantial volume of information that should be ensured. This is finished with a point so the information can't be duplicated. The minute you need to utilize this information gazing from improvement stage to testing stage, there are chances that it could be abused. This additionally increments further odds of information burglary and information misfortune.  

1. Information concealing is one of the ongoing advancements that have developed to such an extent that the information can be utilized security inside the nonproduction condition. This likewise demonstrates supportive for any association to meet the security controls for information.  

2. Securing information is powerless as it might include checking every single activity of the information back to front – looking as the information is being utilized. This is a standout amongst the best manners by which incite move can be made in the event that it is being abused.  

3. So information veiling unquestionably is a standout amongst the best approaches to help ensure important information against misfortune or burglary, notwithstanding when it is being replicated to another source.  

4. The procedure is finished by guaranteeing that restricted calculation is being utilized to cover information. Under this condition the touchy information is quickly supplanted by information that is progressively reasonable however not as same as genuine.

Similar questions