Data Security for Dummies in 5 mins

Data Breach

Data Security means to protect the database from the attacker who tries to gain unauthorized access throughout the lifecyle. Data security involves data encryption, hashing, tokenization and key management practices.

  • Encryption: Its a computing process where plaintext gets encoded into ciphertext which is accessible by authorized party only . To access this encrypted data user must have a cryptographic key with right credentials. A cipher (an ecryption algorithm) is used in encryption. There are two types of encryption named :
    Symmetric Encryption: In this method the key used for encrypting and decrypting is the same , hence it’s also called “secret key” because this key must be kept secret from a 3rd party. One of the most widely used symmetric encryption ciphers is the Advanced Encryption Standard(AES).
    Asymmetric Encryption: In this method there are two different keys called Public key and Private key. These are two separate but mathematically connected cryptographic keys. Public Key is the key which associates in encrypting the data whereas Private key is the key which decrypts the encrypted data. Most widely used asymmetric encryption algorithm is the RSA Asymmetric Encryption Algorithm.
Asymmetric Encryption
  • Data Masking: It is a technique of generating fake data yet a realistic version of the organization’s DATA. This technique changes the value of data while using the exact format. There are different types of data masking but one that is most widely used is SDM.
    >Static Data Masking(SDM): This method takes a back up of the original data which is also known as golden data , it removes all the crucial data while masking it in stasis inorder to develop,test and train. Then it saves the generated masked copy into the desired directory.
Sourced from IMPERVA
  • RBAC : Role-Based Access Control also known as RBAC is a mechanism used by different corporations to provide specific privileges to specific users depending on various factors such as type of user or whether the user is an employee.
Sourced from IMPERVA

Why is Data Security important?




Hello Akito over here | Cyber Security enthusiast | trying to do better.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Setting them Straight — 10 Years Back in the Future — A Brief Overview of the Hacker Scene Circa…

Quantum Computing Threatens Public Key: Do We Need to Worry?

Changing the Monolith, Part 1: Building Alliances for a Secure Culture

{UPDATE} Mind Cards. Hack Free Resources Generator

LABS Group Monthly Update — March

How To Stop Compromising Your Cell Phone Security

Zero Trust 1 | Device Management and Secure Access to Organization Resources

OSINT — Beginner’s Guide (Part 1)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Tanishq Tanwar

Tanishq Tanwar

Hello Akito over here | Cyber Security enthusiast | trying to do better.

More from Medium

Best Free Certification Course for Beginners to Learn Cloud Computing in 2022

Cracking the SANS GSEC Certification

3 Machine lab — 3. Kerberos - Attacks and Detections

How to Integrate Customize AI Model to RPA UiPath Platform