Sveriges mest populära poddar
Certified: The CompTIA Security+ Audio Course

Episode 93: Methods to Secure Data (Part 2) (Domain 3)

17 min15 juni 2025

Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In this episode, we explore hashing, tokenization, and data masking—each serving a unique purpose in reducing data exposure while supporting operations like analytics or software testing. Hashing protects integrity and is commonly used for password storage and verification, using algorithms like SHA-256 or bcrypt to create one-way representations that can’t be reversed. Tokenization replaces sensitive fields with random or lookup-based stand-ins that preserve format but eliminate value—useful in payment systems or when storing PII. Data masking, meanwhile, modifies real data to create safe but functional test datasets, often used in development environments or user training. These methods don’t always secure the data itself—but they significantly reduce the risk of its misuse. Choosing the right technique depends on context, but all support the broader goal: protecting sensitive information without crippling functionality.

Fler avsnitt av Certified: The CompTIA Security+ Audio Course

Visa alla avsnitt av Certified: The CompTIA Security+ Audio Course

Certified: The CompTIA Security+ Audio Course med Dr. Jason Edwards finns tillgänglig på flera plattformar. Informationen på denna sida kommer från offentliga podd-flöden.