Tagged articles
5 articles
Page 1 of 1
Su San Talks Tech
Su San Talks Tech
Jan 19, 2025 · Information Security

How Data Masking Protects Sensitive Information: Techniques and Best Practices

This article explains data masking techniques—including static (SDM) and dynamic (DDM) methods—detailing how to protect sensitive fields like phone numbers and IDs through replacement, truncation, encryption, randomization, and other schemes, while preserving data utility for testing and analysis.

Dynamic Maskingdata anonymizationdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques and Best Practices
Su San Talks Tech
Su San Talks Tech
Apr 5, 2024 · Information Security

How Data Masking Protects Sensitive Information: Techniques & Best Practices

This article explains why personal data leaks happen, defines data masking (desensitization), compares static and dynamic masking, and details six common masking techniques—invalidating, randomization, replacement, symmetric encryption, averaging, and offsetting—to help developers safeguard privacy.

Dynamic Maskingdata anonymizationdata masking
0 likes · 8 min read
How Data Masking Protects Sensitive Information: Techniques & Best Practices
NetEase LeiHuo UX Big Data Technology
NetEase LeiHuo UX Big Data Technology
May 9, 2022 · Information Security

Data Masking (Data Desensitization) Strategies and Techniques

In the era of big data, protecting sensitive information through static and dynamic data masking techniques—such as nullification, randomization, substitution, symmetric encryption, averaging, and offset—ensures data security while preserving usability for development, testing, and analytics.

Dynamic Maskingdata maskingdata security
0 likes · 8 min read
Data Masking (Data Desensitization) Strategies and Techniques
Code Ape Tech Column
Code Ape Tech Column
Jan 11, 2022 · Information Security

Data Masking (Desensitization) Techniques: Static and Dynamic Approaches

This article explains data masking, its importance for protecting sensitive information, and details both static and dynamic masking methods—including nullification, randomization, substitution, symmetric encryption, mean value, and offset rounding—along with practical examples and implementation considerations.

Dynamic Maskinginformation securityprivacy
0 likes · 8 min read
Data Masking (Desensitization) Techniques: Static and Dynamic Approaches
macrozheng
macrozheng
Dec 17, 2020 · Information Security

How Data Masking Protects Your Users: Techniques & Best Practices

Data masking, also known as data desensitization, transforms sensitive information such as phone numbers and ID numbers using static and dynamic methods—including truncation, randomization, replacement, encryption, and averaging—to prevent privacy breaches while preserving data utility for testing, analysis, and production environments.

Dynamic Maskingdata anonymizationdata masking
0 likes · 9 min read
How Data Masking Protects Your Users: Techniques & Best Practices