CS Mid 2 Ans
CS Mid 2 Ans
1. Data Encryption
In Transit: Encrypt data sent over networks using protocols like HTTPS,
SSL/TLS, or VPNs to protect against interception.
At Rest: Use encryption for stored data (e.g., on servers, databases, or
devices) to prevent access in case of theft or breach.
2. Access Control
Role-Based Access Control (RBAC): Assign permissions based on the
user’s role to limit access to only the data necessary for their
responsibilities.
Least Privilege Principle: Grant users the minimum access required to
perform their tasks.
Multi-Factor Authentication (MFA): Add layers of security by requiring
multiple forms of verification for access.
3. Data Masking and Anonymization
Data Masking: Obscure sensitive data elements (e.g., by replacing
characters with symbols) for use in testing or analytics without exposing
real information.
Anonymization: Remove or scramble identifiable information to prevent
tracing data back to individuals.