Geographic Restrictions (Geofencing)
Involves setting up virtual boundaries to restrict data access based on geographic locations
Encryption
Process of converting ordinary information (plain text) into unintelligible form (cipher text)
Most encryption algorithms that are used today are open source and publicly accessible
The key is what makes the algorithm strong. Long key provides higher security
Hashing
Technique that converts data into a fixed size of numerical or alphanumeric characters
It is a one-way function
Obfuscation
Make the data unclear or unintelligible, making it difficult for unauthorized users to understand
Segmentation
Involves dividing a network into separate segments, each with its own security controls
Permission Restrictions
Involves defining who has access to specific data and what they can do with it
e.g. Role Based Access Control (RBAC)