Data Security

Access Control

Security techniques that regulate who or what can view or use resources in a computing environment.

Anonymization

The process of removing personally identifiable information from data sets, so individuals cannot be identified.

Backup

The process of copying and storing data to prevent loss in case of system failure, corruption, or attack.

Data Encryption

The process of encoding data to prevent unauthorized access, ensuring that only authorized parties can read it.

Data Integrity

The assurance that data is accurate, consistent, and trustworthy over its entire lifecycle.

Data Loss Prevention (DLP)

A set of tools and practices designed to prevent sensitive data from being lost, misused, or accessed by unauthorized users.

Decryption

The process of converting encrypted data back into its original form so it can be understood and processed.

Hashing

A technique that converts data into a fixed-size string of characters, often used for data integrity and password protection.

Insider Threat

A risk posed by individuals within an organization who may intentionally or unintentionally compromise data security.

Key Management

The administration of cryptographic keys, including their generation, exchange, storage, and destruction.

Least Privilege

A security principle where users are granted the minimum level of access—or permissions—needed to perform their tasks.

Masking

The process of hiding sensitive data by replacing it with fictional but realistic values.

Redaction

The removal or obscuring of sensitive data in documents before they are shared.

Tokenization

The process of replacing sensitive data with unique identification symbols (tokens) that retain essential information without compromising security.

Zero Trust

A security model that requires verification for every user and device attempting to access resources, regardless of whether they are inside or outside the network.


Want to explore more? Stay tuned for new terms and updates!

Last updated on