Data securityData security comprises the processes and associated tools t... Leggi comprises the processes and associated tools that protect sensitive information assets, either in transit or at rest. Data securityData security comprises the processes and associated tools t... Leggi methods include:
- Encryption (applying a keyed cryptographic algorithm so that data is not easily read and/or altered by unauthorized parties)
- Masking (substituting all or part of a high-value data item with a low-value representative token)
- Erasure (ensuring that data that is no longer active or used is reliably deleted from a repository)
- Resilience (creating backup copies of data so that organizations can recover data should it be erased or corrupted accidentally or stolen during a data breach)