Download now Free registration required
So, one is responsible for making sure that sensitive data is seen only by those who need it. One has got a lot of bases covered - laptops are encrypted, network access controls are established, and database activity is being monitored. But one knows there are still a few holes - software development still gets copies of production data for testing purposes, new staff still use customer records for training, and the outsourcing company that handles customer service shouldn't be using Social Security Numbers to verify identities. But one can plug these holes by masking the data. Data masking strengthens privacy and security by changing data while preserving its integrity.
- Format: PDF
- Size: 608.3 KB