Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel. Data masking can also be referred as anonymization, or tokenization, depending on different context.
The main reason to mask data is to protect information that is classified as personally identifiable information, or mission critical data. However, the data must remain usable for the purposes of undertaking valid test cycles. It must also look real and appear consistent. It is more common to have masking applied to data that is represented outside of a corporate production system. In other words, where data is needed for the purpose of application development, building program extensions and conducting various test cycles. It is common practice in enterprise computing to take data from the production systems to fill the data component, required for these non-production environments. However, this practice is not always restricted to non-production environments. In some organizations, data that appears on terminal screens to call center operators may have masking dynamically applied based on user security permissions (e.g. preventing call center operators from viewing credit card numbers in billing systems).
The primary concern from a corporate governance perspective[1] is that personnel conducting work in these non-production environments are not always security cleared to operate with the information contained in the production data. This practice represents a security hole where data can be copied by unauthorized personnel, and security measures associated with standard production level controls can be easily bypassed. This represents an access point for a data security breach.
^"Information Management Specialists". GBT. Retrieved 24 August 2017.
personnel. Datamasking can also be referred as anonymization, or tokenization, depending on different context. The main reason to maskdata is to protect...
user. Datamasking of structured data is the process of obscuring (masking) specific data within a database table or cell to ensure that data security...
DataMask or similar may mean: In computer science, "datamask" is another name for mask (computing), a bit pattern used to extract information from another...
Solutions to preserve privacy within data publishing has been proposed, including privacy protection algorithms, data ”masking” methods, and regional privacy...
amount to be closely to 1:1 in the symbol, masking algorithm: 5.8.4 is used. Masking sequence is applied to Data Region through the XOR operation. Finder...
Look up masking in Wiktionary, the free dictionary. Masking can mean: Backmasking, a recording technique in which a sound or message is recorded backward...
of a datamasking or de-identification project Consolidation of multiple databases into a single database and identifying redundant columns of data for...
capacity. These remainder bits shall always have the value 0 before datamasking. Rectangular Micro QR Code can encode 361 numeric, 219 alphanumeric,...
application delivery; and the data security software includes Data Activity Monitoring (DAM), data risk analytics, datamasking, discovery and assessment...
Maskdata preparation (MDP), also known as layout post processing, is the procedure of translating a file containing the intended set of polygons from...
an enterprise data protection software company that provides discovery, classification, masking and encryption software, along with data compression software...
simultaneous masking, frequency masking or spectral masking. Auditory masking in the time domain is known as temporal masking or non-simultaneous masking. The...
In cryptography, CDMF (Commercial DataMasking Facility) is an algorithm developed at IBM in 1992 to reduce the security strength of the 56-bit DES cipher...
level of data security should be declared in a data sanitization policy to future proof the process. The process of data erasure involves masking all information...
The data codewords is represented with values from 0 to 112 and mask value is counted as leading data codeword from 0 to 3. In this way the data protected...
company that provides data-centric security, user access control, datamasking, and auditing solutions for complex, hybrid data environments. BlueTalon...
sophisticated threat actor through the use of datamasking techniques such as encryption or compression. Endpoint (data in use) systems run on internal end-user...
event processing, datamasking, data quality, data replication, data virtualization, master data management, ultra messaging, and data governance. These...
forward masking, backward masking, and simultaneous masking. In forward masking, the mask precedes the target. In backward masking the mask follows the...
emphasizes that masks are not a wholly universal cultural phenomenon, raising the question why some cultures do not have a masking tradition. "mask (n.)". Online...
Distributed Data Management Architecture, an open, published architecture for creating, managing and accessing data on a remote computer. Dynamic DataMasking, a...
style mask, which is an eyes-and-nose diving mask with a built-in LCD display, commercially known as a DataMask, capable of providing various dive data from...
data through datamasking, row permissions, and role-based security, and can utilize database audit utilities to maintain audit trails for their data...
threshold of hearing Temporal masking (forward masking, backward masking) Simultaneous masking (also known as spectral masking) A compression algorithm can...