Data Security Technologies: Data Security Is The Means of Ensuring That
Data Security Technologies: Data Security Is The Means of Ensuring That
Data Security Technologies: Data Security Is The Means of Ensuring That
Many different techniques have been developed to optimize the backup procedure.
These include optimizations for dealing with open files and live data sources as well
as compression, encryption, and de-duplication, among others. Many organizations
and individuals try to have confidence that the process is working as expected and
work to define measurements and validation techniques. It is also important to
recognize the limitations and human factors involved in any backup scheme.
Data Masking
Data Masking of structured data is the process of obscuring (masking) specific data within a
database table or cell to ensure that data security is maintained and sensitive customer
information is not leaked outside of the authorized environment.
It ensures that sensitive data is replaced with realistic but not real data. The goal is that sensitive
customer information is not available outside of the authorized environment. Data masking is
typically done while provisioning non-production environments so that copies created to support
test and development processes are not exposing sensitive information and thus avoiding risks of
leaking. Masking algorithms are designed to be repeatable so referential integrity is maintained.
Common business applications require constant patch and upgrade cycles and require that 6-8
copies of the application and data be made for testing. While organizations typically have strict
controls on production systems, data security in non-production instances is often left up to
trusting the employee, with potentially disastrous results.
Creating test and development copies in an automated process reduces the exposure of sensitive
data. Database layout often changes, it is useful to maintain a list of sensitive columns in a
without rewriting application code. Data masking is an effective strategy in reducing the risk of
data exposure from inside and outside of a organization and should be considered a best practice
for curing non-production databases.
Data Erasure
Data erasure is a method of software-based overwriting that completely destroys all electronic
data residing on a hard drive or other digital media to ensure that no sensitive data is leaked
when an asset is retired or reused.
Data erasure is a method of software-based overwriting that completely destroys all electronic
data residing on a hard disk drive or other digital media. Permanent data erasure goes beyond
basic file deletion commands, which only remove direct pointers to data disk sectors and make
data recovery possible with common software tools. Unlike degaussing and physical destruction,
which render the disk unusable, data erasure removes all information while leaving the disk
operable, preserving assets and the environment.
Software-based overwriting uses a software application to write patterns of meaningless data
onto each of a hard drive's sectors. There are key differentiators between data erasure and other
overwriting methods, which can leave data intact and raise the risk of data breach or spill,
identity theft and failure to achieve regulatory compliance. Data erasure also provides multiple
overwrites so that it supports recognized government and industry standards. It provides
verification of data removal, which is necessary for meeting certain standards.
To protect data on lost or stolen media, some data erasure applications remotely destroy data if
the password is incorrectly entered. Data erasure tools can also target specific data on a disk for
routine erasure, providing a hacking protection method that is a less time-consuming than
encryption.
Full disk overwriting
There are many overwriting programs, but data erasure offers complete security by destroying
data on all areas of a hard drive. Disk overwriting programs that cannot access the entire hard
drive, including hidden/locked areas like the host protected area (HPA), device configuration
overlay (DCO), and remapped sectors, perform an incomplete erasure, leaving some of the data
intact. By accessing the entire hard drive, data erasure eliminates the risk of data remanence.
The 1995 edition of the National Industrial Security Program Operating Manual (DoD 5220.22-
M) permitted the use of overwriting techniques to sanitize some types of media by writing all
addressable locations with a character, its complement, and then a random character.