1. Encryption: The process of converting plain text into ciphertext to protect sensitive data from unauthorized access.
2. Tokenization: A technique used to replace sensitive data with a unique identifier or “token” to prevent unauthorized access.
3. Access control: A system that allows only authorized personnel to access sensitive data.
4. Authentication: The process of verifying the identity of a user, device or system.
5. Authorization: The process of determining what level of access a user, device or system should have.
6. Data masking: The process of obfuscating sensitive data to protect it from unauthorized access.
7. Data logging and auditing: The process of recording and analyzing who accessed, modified or deleted data.
8. Data classification: The process of categorizing data based on its sensitivity and importance.
9. Intrusion detection and prevention: The use of software and hardware to detect and prevent unauthorized access.
10. Firewalls: A network security system that monitors and blocks unauthorized access to a system or network.
Publication date: