Preview

Data Masking

Powerful Essays
Open Document
Open Document
4525 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Masking
An Oracle White Paper
July 2010

Data Masking Best Practices

Oracle White Paper—Data Masking Best Practices

Executive Overview ........................................................................... 1
Introduction ....................................................................................... 1
The Challenges of Masking Data ....................................................... 2
Implementing Data Masking .............................................................. 2
Comprehensive Enterprise-wide Discovery of Sensitive Data ........ 3
Enforcing Referential Relationships during Data Masking .............. 4
Rich and Extensible Mask Library.................................................. 6
Sophisticated Masking Techniques ............................................... 7
High Performance Mask Execution ................................................ 9
Integrated Testing with Application Quality Management solutions11
Oracle’s Comprehensive Solutions for Database Security ........... 12
Customer Case Studies ................................................................... 12
Conclusion ...................................................................................... 13

Oracle White Paper—Data Masking Best Practices

Executive Overview
Enterprises need to share production data with various constituents while also protecting sensitive or personally identifiable aspects of the information. As the number of applications increases, more and more data gets shared, thus further increasing the risk of a data breach, where sensitive data gets exposed to unauthorized parties. Oracle Data Masking addresses this problem by irreversibly replacing the original sensitive data with realistic -looking scrubbed data that has same type and characteristics as the original sensitive data thus enabling organizations to share this information in compliance with information security policies and government regulations.
This

You May Also Find These Documents Helpful

  • Good Essays

    301 final exam review

    • 2537 Words
    • 12 Pages

    Network Effects – Also known as Metcalfe’s Law, or network externalities. When the value of a product or service increases as its number of users expands…

    • 2537 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 697 Words
    • 3 Pages

    Network slowdowns- With the increased devices connected to the network slower operations will be on it.…

    • 697 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Lawrence Lessig in Code 2.0 argues that the rise of the internet and technology will inevitably lead to an increase in regulation and decrease in our right to privacy. Explain, through the use of recent developments and current legislation, how technology is challenging accepted concepts of Data Protection and Information Law…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cool Paper

    • 781 Words
    • 4 Pages

    The theft of data is the least significant cause of financial loss due to a security breach. True or false?…

    • 781 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Week 10 Term paper

    • 420 Words
    • 2 Pages

    “Think Before You Dig: Privacy Implications of Data Mining & Aggregation.” (September 2004). Retrieved from http://www.nascio.org/publications/documents/NASCIO-dataMining.pdf…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Oracle R12 Whitepaper

    • 1110 Words
    • 5 Pages

    • UBM Global Trade, formerly Commonwealth Business Media, Inc., has been the leading provider of proprietary data, news, business intelligence and analytical content supporting commercial maritime, rail, trucking, warehousing and logistics industries worldwide since 1827. The company’s portfolio of more than 100 online, print and interactive workflow business solutions includes The Journal of Commerce, The Journal of Commerce Conferences, PIERS Global Intelligence Solutions and an array of international trade and transportation databases and directories. UBM Global Trade, a subsidiary of United Business Media Limited (LON: UBM), is headquartered in East Windsor, NJ, with offices throughout the United States and in Canada and Hong Kong. In 2009, Commonwealth Business Media, Inc fully divested its Chicago, UK and Asia unit and rebranded itself as UBM Global Trade.…

    • 1110 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    pubpolessay

    • 632 Words
    • 2 Pages

    From afar, the data breach notification system may seem wholesome, however look a bit closer and you will find many insufficiencies made up of inconsistent state data breach laws that compose our nation’s standard defense against data breaches. The inconsistencies in state data breach laws cause insufficient protection of citizens, unnecessary complexities for businesses, and de-facto national requirements. Data breaches cause corporations millions of dollars and is one of the fastest growing crimes committed. For instance, California is witnessing identity theft as one of the fastest growing crimes committed. In 2000, the Los Angeles County Sheriff’s Department reported 1,932 identity theft cases, which was a 108 percent increase from the previous year. After a large amount of customer databases containing personal information were breached, security data breach notification laws were enacted by most American states since 2002. Specifically, the first security breach notification law introduced by California State Senator Peace on February 12, 2002 was law Senate Bill No. 1386 (“SB 1386”) in the state of California; it was passed unanimously by the California Senate and Assembly and it became effective July 1, 2003. Since most states follow California’s security breach laws and California is leading the nations effort in security data breach laws, I will be discussing California’s data laws in further detail, as this will focus in on issues regarding data laws in general. SB 1386 requires any company that stores its customer’s unencrypted date electronically to notify the customers if a security breach has taken place or if they have reason to believe that unencrypted date has been stolen. As defined by California’s law, personal information “includes any user name or email address, in combination with a password or security question and answer that would permit access to an online account [as well as medical…

    • 632 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Explain Plan

    • 7218 Words
    • 29 Pages

    Introduction ....................................................................................... 1 The Execution Plan ........................................................................... 2 Displaying the Execution plan ........................................................ 3 What is Cost .................................................................................. 8 Understanding the execution plan ..................................................... 8 Cardinality ..................................................................................... 9 Access Method ............................................................................ 12 Join method ................................................................................. 15 Join Order.................................................................................... 18 Partitioning .................................................................................. 20 Parallel Execution ........................................................................ 22 Conclusion ...................................................................................... 27…

    • 7218 Words
    • 29 Pages
    Powerful Essays
  • Powerful Essays

    focus on the collection and use of personal data. He argues that the process of information storage and…

    • 2748 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    By using these preventative measures businesses can save the U.S $44 billion dollars, productivity and time associated with recovering data from a breach. Also stated in this article was how 70% of security breaches occur because of an end user error. This is why it is necessary to insure ourselves with better technology such as backup data loss prevention and encryption to defend data from human error, as stated above. We have to remember that hackers invent new methods every day to get their hand on important information, and that is why you can never be too careful when it…

    • 485 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Database Security

    • 7064 Words
    • 29 Pages

    Phifer, L. (2010). Top ten data breaches and blunders of 2009. eSecurity Planet, February 10. Retrieved…

    • 7064 Words
    • 29 Pages
    Powerful Essays
  • Good Essays

    This section from the Arianna Huffington’s book Thrive really spoke to me, and I underlined almost the entire thing! The main idea of this part of the book that the author is trying to communicate is how important it is to actually take good care of yourself in order to be able to do anything else well, or to be able to help or be a positive impact on anyone else’s life. Using the analogy securing your own oxygen mask so that you can breathe and in turn help others to get their masks on and help them, there is a very good point to be understood: How can we expect to be able to work effectively, achieve our goals, get things done, and have successful relationships with others if we aren’t even properly breathing…

    • 1238 Words
    • 5 Pages
    Good Essays
  • Good Essays

    teenager and technology

    • 780 Words
    • 1 Page

    subjects of eternal debates, the main one is privacy. A loss of privacy is one of the social issue…

    • 780 Words
    • 1 Page
    Good Essays