Innovation in IT

  • Year: 2016
  • Volume: 3
  • Issue: 1

An approach to Data Masking: Exploration

  • Author:
  • Ruby Jain1, Manimala Puri2
  • Total Page Count: 8
  • DOI:
  • Page Number: 1 to 8

1Research Scholar, JSPM's AIOCA under SPPU, Pune, Maharashtra

2Director, JSPM's AIOCA, Pune, Maharashtra

Abstract

Amidst the numerous cyber attacks, securing organizational data and information has made it a tough time for administrators. The fear of cyber attacks has also made a tremendous change in the security solutions market in the recent decade. McAfee reported that according to recent Verizon Data Breach Investigations report, more than 92% of records breached involved a database. Annual research by the Computer Emergency Response Team indicates that up to half of those breaches are caused by internal users. In this research article the researchers explored the details of data masking, complications related with masking, Challenges, Benefits of Data Masking, comprehensive data privacy solution.

Keywords

Encryption, Key management, Reporting, Workflow and identity and access management