- Obfuscation—masks data so it cannot be read if stolen
- Steganography—embeds or hides data inside other data
- Salting—appends a random value to passwords
- Salting—prevents duplicate passwords being stored
- Salting—reduces the effectiveness of a brute force attack
- Data-in-transit—use TLS or VPN to protect it
- Data-at-rest—use encryption such as AES/DES/3DES
- Data-in-use —resides in volatile RAM.
- Key strength—smaller the key size the faster but less secure it is
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.