Data Obfuscation - Part 1
Data Obfuscation - Part 1
CT069-3-3-DBS (VE1.0)
Topic 3
Data Obfuscation – Part 1
Learning
Outcomes
• Do data classification
• Explain various data obfuscation techniques
• Implement data encryption, hashing, anonymization
and masking based on data classification
ID Name Phone
Email Country Qualification Gender Passport Password
john@e
0192646 mail.co A1111111
C100 John 5476 m Indonesia B.Sc Male 11 JohnPwd
mary@
0142646 email.c A222222
C200 Mary 5476 om Malaysia Diploma Female 222 MaryPwd
Scenario #2 – Research & Analysis: Let’s say you have been requested to
provide a copy of the database to the marketing department for their analysis.
How will you protect the sensitive data before passing them to the marketing
department ?
Encryption
Hashing
• Encryption Keys
• Database Encryption
– What it does is encrypting the data files
– Create master key in master database (do this only once per server)
USE master;
CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'QWEqwe!@#123';
Note: If the encrypted or decrypted column shows NULL after you perform encryption/decryption, then it means
that you have done something wrong or you did not open the symmetric key for encryption/decryption or you
don’t have permission to the key
Backup
SQL Server data
files
files
Client file system
Encryption
Backups can be = TDE
encrypted as well
Module Code & Module Title Slide Title SLIDE 36
What To Expect Next Week