SlideShare a Scribd company logo
1 of 11
Data Privacy Through
Data Masking
Table of Contents
•Introduction
•Why data masking is important?
•Nullification
•Substitution
•Encryption
•Conclusion
Introduction
•Data protection is a critical component
of the analytics business and it is
sometimes a requirement for
companies in certain countries where
information laws are very strict.
•Data Protection Act 1998 (UK)
•EC directive 94/95(EU)
•HIPEA (US).
Why data masking is
important?
•To ensure that sensitive information are not leaked
and used by unauthorized parties in possibly illegal
activities, it is essential that protection in the form of
data masking be applied to all data.
•Data masking makes it more difficult for
unauthorized parties who might have accessed the
data illegally to obtain critical information.
•Data masking also allow companies which require
analytics services to be sure that their data will not
be used by the service providers for other
purposes.
Nullification
•Nullification is the process of neutralizing
certain sections of the data by way of
substituting the information with a single null
value.
•Usually the null value used is X or an empty
space, but there are other choices.
•Below is a snapshot of a code that does
nullification.
Nullification
/**********************************************************************************
NULLIFICATION CODE EXAMPLE
***********************************************************************************/
DATA CREDIT_CARD;
SET CREDIT_CARD;
NEW_CARD_NO = CARD_NO;
DO I = 1 TO 12;
SUBSTR(NEW_CARD_NO,I,1) = 'X';
END;
DROP I;
PUT CARD_NO = NEW_CARD_NO =;
RUN;
CARD_NO=4211569111000001 NEW_CARD_NO=XXXXXXXXXXXX0001
CARD_NO=4211569111000002 NEW_CARD_NO=XXXXXXXXXXXX0002
CARD_NO=4211569111000003 NEW_CARD_NO=XXXXXXXXXXXX0003
CARD_NO=4211569111000004 NEW_CARD_NO=XXXXXXXXXXXX0004
CARD_NO=4211569111000005 NEW_CARD_NO=XXXXXXXXXXXX0005
CARD_NO=4211569111000006 NEW_CARD_NO=XXXXXXXXXXXX0006
Substitution
•Substitution is the process of replacing a
section of the information with pseudo
information.
•Usually a fixed length of the information will
be replaced a randomly generated number;
this number is fixed throughout for all the
values.
•Below is a code showing how this is done.
Substitution
/**********************************************************************************
SUBSTITUTION CODE EXAMPLE
***********************************************************************************/
DATA CREDIT_CARD;
SET CREDIT_CARD;
NEW_CARD_NO = CARD_NO;
SUBSTR(NEW_CARD_NO,1,8) = '12345678';
PUT CARD_NO = NEW_CARD_NO =;
RUN;
CARD_NO=4211569111000001 NEW_CARD_NO=1234567811000001
CARD_NO=4211569111000002 NEW_CARD_NO=1234567811000002
CARD_NO=4211569111000003 NEW_CARD_NO=1234567811000003
CARD_NO=4211569111000004 NEW_CARD_NO=1234567811000004
CARD_NO=4211569111000005 NEW_CARD_NO=1234567811000005
CARD_NO=4211569111000006 NEW_CARD_NO=1234567811000006
Encryption
•Encryption is the process of masking
the information via an algorithm that
renders it impossible to retrieve the
original information without the key.
•The original information is usually
transformed by a bit operation with a
key.
•Below is a snapshot of the code.
Encryption
/**********************************************************************************
ENCRYPTION CODE EXAMPLE
***********************************************************************************/
DATA CREDIT_CARD;
SET CREDIT_CARD;
NEW_CARD_NO =
COMPRESS(SUBSTR(CARD_NO,1,8)||BXOR(INPUT(SUBSTR(CARD_NO,9,8),8.),'123456
78'));
PUT CARD_NO = NEW_CARD_NO =;
RUN;
CARD_NO=4211569111000001 NEW_CARD_NO=421156911816975
CARD_NO=4211569111000002 NEW_CARD_NO=421156911816972
CARD_NO=4211569111000003 NEW_CARD_NO=421156911816973
CARD_NO=4211569111000004 NEW_CARD_NO=421156911816970
CARD_NO=4211569111000005 NEW_CARD_NO=421156911816971
CARD_NO=4211569111000006 NEW_CARD_NO=421156911816968
Conclusion
•Data masking is a simple and yet
crucial process in data warehousing
and analytics.
•SAS provides many different options
for users who wish to mask their data.

More Related Content

What's hot

Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurestorm
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdfCybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdfssuser7b150d
 
ERP Data Migration Methodologies
ERP Data Migration MethodologiesERP Data Migration Methodologies
ERP Data Migration MethodologiesAhmed M. Rafik
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+DesignAlfred Ouyang
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?PECB
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
Embedding RCSA into Strategic Planning and Business Strategy
Embedding RCSA into Strategic Planning and Business StrategyEmbedding RCSA into Strategic Planning and Business Strategy
Embedding RCSA into Strategic Planning and Business StrategyAndrew Smart
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Risk identification
Risk identificationRisk identification
Risk identificationmurukkada
 
Risk-management
 Risk-management Risk-management
Risk-managementUmesh Gupta
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 

What's hot (20)

Information Security
Information SecurityInformation Security
Information Security
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
 
Dados x informação
Dados x informaçãoDados x informação
Dados x informação
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdfCybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
Cybersecurity Capability Maturity Model Self-Evaluation Report Jan 27 2023.pdf
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
ERP Data Migration Methodologies
ERP Data Migration MethodologiesERP Data Migration Methodologies
ERP Data Migration Methodologies
 
Lecture 1 Information System
Lecture 1  Information SystemLecture 1  Information System
Lecture 1 Information System
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?We've been hacked! Now, what's the BCP?
We've been hacked! Now, what's the BCP?
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
Embedding RCSA into Strategic Planning and Business Strategy
Embedding RCSA into Strategic Planning and Business StrategyEmbedding RCSA into Strategic Planning and Business Strategy
Embedding RCSA into Strategic Planning and Business Strategy
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Risk identification
Risk identificationRisk identification
Risk identification
 
Risk-management
 Risk-management Risk-management
Risk-management
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Data warehouse
Data warehouseData warehouse
Data warehouse
 

Viewers also liked

DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewAxis Technology, LLC
 
DB16-Program-FINAL-small
DB16-Program-FINAL-smallDB16-Program-FINAL-small
DB16-Program-FINAL-smallLatasia Brown
 
Curtis Martin Resume Oct 2015 Controller
Curtis Martin Resume Oct 2015 ControllerCurtis Martin Resume Oct 2015 Controller
Curtis Martin Resume Oct 2015 ControllerCurtis Martin
 
Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...
Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...
Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...Joubin Rahimi
 
Michael Jay Freer - Information Obfuscation
Michael Jay Freer - Information ObfuscationMichael Jay Freer - Information Obfuscation
Michael Jay Freer - Information Obfuscationiasaglobal
 
Shared Value in the Pharmaceutical Industry
Shared Value in the Pharmaceutical IndustryShared Value in the Pharmaceutical Industry
Shared Value in the Pharmaceutical IndustryRobert Au
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceCapgemini
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingSolidQ
 
Accelerating Devops via Data Virtualization | Delphix
Accelerating Devops via Data Virtualization | DelphixAccelerating Devops via Data Virtualization | Delphix
Accelerating Devops via Data Virtualization | DelphixDelphixCorp
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud
 
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...CA Technologies
 
Test data management a case study Presented at SiGIST
Test data management a case study Presented at SiGISTTest data management a case study Presented at SiGIST
Test data management a case study Presented at SiGISTrenardv74
 

Viewers also liked (19)

Data masking a developer's guide
Data masking a developer's guideData masking a developer's guide
Data masking a developer's guide
 
DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking Overview
 
DB16-Program-FINAL-small
DB16-Program-FINAL-smallDB16-Program-FINAL-small
DB16-Program-FINAL-small
 
Curtis Martin Resume Oct 2015 Controller
Curtis Martin Resume Oct 2015 ControllerCurtis Martin Resume Oct 2015 Controller
Curtis Martin Resume Oct 2015 Controller
 
Kleeneze 2010 ewb 35
Kleeneze 2010 ewb 35Kleeneze 2010 ewb 35
Kleeneze 2010 ewb 35
 
Kleeneze 2010 ewb 48
Kleeneze 2010 ewb 48Kleeneze 2010 ewb 48
Kleeneze 2010 ewb 48
 
Kleeneze 2010 ewb 44
Kleeneze 2010 ewb 44Kleeneze 2010 ewb 44
Kleeneze 2010 ewb 44
 
Kleeneze 2010 ewb 25
Kleeneze 2010 ewb 25Kleeneze 2010 ewb 25
Kleeneze 2010 ewb 25
 
Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...
Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...
Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...
 
Michael Jay Freer - Information Obfuscation
Michael Jay Freer - Information ObfuscationMichael Jay Freer - Information Obfuscation
Michael Jay Freer - Information Obfuscation
 
Shared Value in the Pharmaceutical Industry
Shared Value in the Pharmaceutical IndustryShared Value in the Pharmaceutical Industry
Shared Value in the Pharmaceutical Industry
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and Compliance
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data Masking
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
 
Accelerating Devops via Data Virtualization | Delphix
Accelerating Devops via Data Virtualization | DelphixAccelerating Devops via Data Virtualization | Delphix
Accelerating Devops via Data Virtualization | Delphix
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar Slides
 
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
 
Test data management a case study Presented at SiGIST
Test data management a case study Presented at SiGISTTest data management a case study Presented at SiGIST
Test data management a case study Presented at SiGIST
 

More from Murphy Choy

Right time Vs real time
Right time Vs real timeRight time Vs real time
Right time Vs real timeMurphy Choy
 
Applications of the DOW loop
Applications of the DOW loop Applications of the DOW loop
Applications of the DOW loop Murphy Choy
 
Building a decision tree from decision stumps
Building a decision tree from decision stumpsBuilding a decision tree from decision stumps
Building a decision tree from decision stumpsMurphy Choy
 
Data masking with classical ciphers
Data masking with classical ciphersData masking with classical ciphers
Data masking with classical ciphersMurphy Choy
 
A simple introduction to candlestick charts in sas
A simple introduction to candlestick charts in sasA simple introduction to candlestick charts in sas
A simple introduction to candlestick charts in sasMurphy Choy
 
General Insurance Conference 2014: Big Data for Insurance Companies
General Insurance Conference 2014: Big Data for Insurance CompaniesGeneral Insurance Conference 2014: Big Data for Insurance Companies
General Insurance Conference 2014: Big Data for Insurance CompaniesMurphy Choy
 
Edison chen and Cammie Tse Scandal: A twitter study
Edison chen and Cammie Tse Scandal: A twitter studyEdison chen and Cammie Tse Scandal: A twitter study
Edison chen and Cammie Tse Scandal: A twitter studyMurphy Choy
 
Real Time Process Compliance using Nomenclature Approach
Real Time Process Compliance using Nomenclature ApproachReal Time Process Compliance using Nomenclature Approach
Real Time Process Compliance using Nomenclature ApproachMurphy Choy
 

More from Murphy Choy (8)

Right time Vs real time
Right time Vs real timeRight time Vs real time
Right time Vs real time
 
Applications of the DOW loop
Applications of the DOW loop Applications of the DOW loop
Applications of the DOW loop
 
Building a decision tree from decision stumps
Building a decision tree from decision stumpsBuilding a decision tree from decision stumps
Building a decision tree from decision stumps
 
Data masking with classical ciphers
Data masking with classical ciphersData masking with classical ciphers
Data masking with classical ciphers
 
A simple introduction to candlestick charts in sas
A simple introduction to candlestick charts in sasA simple introduction to candlestick charts in sas
A simple introduction to candlestick charts in sas
 
General Insurance Conference 2014: Big Data for Insurance Companies
General Insurance Conference 2014: Big Data for Insurance CompaniesGeneral Insurance Conference 2014: Big Data for Insurance Companies
General Insurance Conference 2014: Big Data for Insurance Companies
 
Edison chen and Cammie Tse Scandal: A twitter study
Edison chen and Cammie Tse Scandal: A twitter studyEdison chen and Cammie Tse Scandal: A twitter study
Edison chen and Cammie Tse Scandal: A twitter study
 
Real Time Process Compliance using Nomenclature Approach
Real Time Process Compliance using Nomenclature ApproachReal Time Process Compliance using Nomenclature Approach
Real Time Process Compliance using Nomenclature Approach
 

Recently uploaded

9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectBoston Institute of Analytics
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 

Recently uploaded (20)

9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Heart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis ProjectHeart Disease Classification Report: A Data Analysis Project
Heart Disease Classification Report: A Data Analysis Project
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 

Data masking in sas

Editor's Notes

  1. In today’s presentation, we will go through several aspects of data privacy as well as the purpose of data masking. We will discuss the various techniques of data masking as well as how they can be implemented in SAS.
  2. Ever since the beginning of analytics, the industry has been plagued by data issues ranging from poor data quality to privacy issues. Since privacy is highly valued, several countries have implemented data protection measures to protect data collected. Several acts have been passed to enforce these measures. Such protection is critical to protecting the consumer rights. However, they can be quite nasty to companies who rely on consumer data. To overcome this, it is important to have methods to mask the sensitive information.
  3. Why is data masking important? Protecting your clients Makes outsourcing safer Illegal access to sensitive data will not compromise the privacy of the clients Adhering to the data protection acts of the various countries There are many methods to do data masking Nullification, Substitution and Encryption are some of the most common methods