Skip to content
Related Articles

Related Articles

Improve Article
Data Concealment Methods
  • Last Updated : 13 Dec, 2019

Companies use a variety of data concealing techniques to protect their confidential data from attackers.

Some of these methods to conceal data are given below:

  1. Obfuscation:
    Obfuscation is the art of making the message confounding, ambiguous, and harder to understand. Data obfuscation is the use of data masking and steganography methods in the cybersecurity. It is used to prevent unauthorized access to secret information. The main advantage is reducing security risk.

    Applications of Data obfuscation:

    • Software obfuscation translates software into a version similar to the original but one that is difficult for hackers to crack.
    • Software watermarking is a method used to prevent software piracy. Software watermarking inserts a secret identifier into the program as proof of ownership.




  2. Data Masking:
    Data masking is important in many controlled industries where personally recognizable information must be shielded from overexposure. Data masking method protects data by replacing secret information with a non-sensitive version. It is used to protect information from third-party vendors.

    Types of Data Masking:

    • Static Data Masking: Static Data Masking is used to provide data for the development and testing of applications without revealing sensitive information.
    • Dynamic Data Masking: Dynamic Data Masking should just be applied in read-only contexts, for example, customer service inquiry functions. It is sometimes viewed as a way to apply role-based security to applications.


  3. Steganography:
    Steganography hides information in another file such as a graphic, audio, or other text file. The benefit of steganography over cryptography is that the secret message does not attract any special attention. Nobody could ever realize that an image contained a secret message. There are several components involved in concealing data. First, there is the embedded data, which is the secret message. The cover-text hides the data producing the stego-text. Media files are perfect for steganographic because of their large size.

Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.

 

My Personal Notes arrow_drop_up
Recommended Articles
Page :