(18.116.37.62)
Users online: 12222     
Ijournet
Email id
 

Innovation in IT
Year : 2016, Volume : 3, Issue : 1
First page : ( 1) Last page : ( 8)
Print ISSN : 2395-1192. Online ISSN : 2394-8205.

An approach to Data Masking: Exploration

Ms. Jain Ruby1, Dr. Puri Manimala2

1Research Scholar, JSPM's AIOCA under SPPU, Pune, Maharashtra

2Director, JSPM's AIOCA, Pune, Maharashtra

Online published on 22 January, 2018.

Abstract

Amidst the numerous cyber attacks, securing organizational data and information has made it a tough time for administrators. The fear of cyber attacks has also made a tremendous change in the security solutions market in the recent decade. McAfee reported that according to recent Verizon Data Breach Investigations report, more than 92% of records breached involved a database. Annual research by the Computer Emergency Response Team indicates that up to half of those breaches are caused by internal users. In this research article the researchers explored the details of data masking, complications related with masking, Challenges, Benefits of Data Masking, comprehensive data privacy solution.

Top

Keywords

Encryption, key management, reporting, workflow and identity and access management.

Top

  
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
748,583,915 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.