SGreene > 2-18.2 Data Protection Methods > Flashcards
Cryptographic technique used to prove integrity
Hashing
The process in which individually identifiable information is altered in such a way that it can no longer be traced back to an individual
Anonymization
Solutions designed to detect data movement and to prevent exfiltration
Data Loss Prevention (DLP)
This solution used proxy and auto discovery to identify cloud applications
CASB
The objective of this solution is to prevent unauthorized copying, distribution, and use of digital content
DRM