Involve setting up virtual boundaries to restrict data access based on the geographic location.
Geographic restrictions
Fundamental data security method that transforms readable data, plaintext, into unreadable data or ciphertext using an algorithm and an encryption key.
Encryption
Technique that converts data into a fixed size of numerical or alphanumeric characters, known as the hash value.
Hashing
Involves replacing some or all of the data in a field with a placeholder, such as X, to conceal the original content.
Masking
Replaces sensitive data with non-sensitive substitutes, known as tokens. The original data is stored securely in a separate database with a token serving as a reference to the original data.
Tokenization
Involves making data unclear or unintelligible, making it difficult for unauthorized users to understand. This can involve various techniques, such as encryption, data masking, and the use of pseudonyms.
Obfuscation
Involves dividing a network into separate segments, each with its own security controls.
Segmentation
Involve defining who has access to specific data and what they can do with it.
Permission restrictions
Refers to any data stored in databases, file systems, or other storage system.
Data at Rest
Encrypts the entire hard drive
Full Dish Encryption
Encrypts specific partitions of a hard drive, leaving other partition unencrypted
Partition Encryption
Encrypts individual files
File Encryption
Encrypts a set of selected files or directories
Volume Encryption
Encrypts data stored in a database
Database Encryption
Encrypts specific fields within a database record
Record Encryption
Refers to data actively moving from one location to another, such as across the Internet or through a private network
Data in Transit/Data in Motion
Cryptographic protocols designed to provide secure communication over a computer network
SSL and TLS
Technology that creates a secure connection over a less secure network (Internet)
Virtual Private Network - VPN
Protocol suite used to secure IP communications by authenticating and encrypting each IP packet in a data stream.
Internet Protocol Security (IPSec)
Refers to data in the process of being created, retrieved,updated, or deleted.
Data in Use
Information controlled by laws, regulations, or industry standards
Regulated Data
Any information that can be used to identify an individual
Personal Identification Information (PII)
Any information about health status, provision of healthcare, or payment for healthcare that can be linked to a specific individual
Protected Health Information (PHI)
Type of confidential business information that provides a company with a competitive edge.
Trade Secret