SlideShare a Scribd company logo
1 of 9
Download to read offline
Data Masking Techniques for InsuranceData Masking Techniques for Insurance
www.niit-tech.com
Lalit Mittal
NIIT Technologies White Paper
CONTENTS
Introduction 3
What is Data Masking? 3
Types of Data Masking 4
Techniques used for Data Masking 4
• Challenges of Masking Data 5
• Complications of Data Masking 5
• Benefits of Data Masking 5
Data Masking Solution 6
Implementing Data Masking Solution 6
Comprehensive Enterprise-wide Discovery of Sensitive Data 7
Isolating Sensitive Data for Masking 7
Conclusion 8
References 8
About the Author 9
About Niit Technologies 9
Insurance companies are using technolog y to manage
communication , processes, storage and security. Information
Technology (IT) solutions are no longer just a business enabler but
an integral part of providing enhanced customer service. IT is
crucial to managing information efficiently and effectively.
However, an overlooked risk for insurance companies is the
vulnerability of personal and business information used for testing
and application development. Many organizations use real data
during the test and developmen t phase of new software
applications. This includes financial records, transac
tional records, and other Personally Identifiable Information (PII).
Further, test environments are less secure because data is exposed
to a variety of unauthorized sources, including in-house testing staff,
consultants, partners and offshore development personnel.
As insurance companies are highly regulated, the use of real data
for testing and development may be putting them at risk of
non-compliance with international regulations. Research has also
found that customer loyalty towards insurance companies is
dependent upon the perception that the institution is taking every
measure to protect the customers’ personal financial information.
Hence insurance organizations must have strict governance over:
• Types of real data used in application testing and development
• Information security precautions and responsibilities
• Use of cloud computing, distributed computing and outsourced
services,
• Experience with data breaches involving real consumer data
This whitepaper explores the various data masking techniques
and the best practices of protecting sensitive data.
Introduction
Data Masking is the process of replacing existing sensitive
information in test or development databases with information that
is realistic but not real. Data masking techniques will obscure
specific data within a database table ensuring data security is
maintained. The data masking is applied across applications
and environments in order to maintain business integrity.
Data is de-identified to ensure that sensitive customer information is
not leaked outside of authorized environments. It must be provided
at non-production environments as new data processing
environments gets built. The new environment has to be created
using data that is authenticated and genuinely useful. This ensures
that new initiatives will work as they have been evolved on data that
reflects real-world scenarios.
Data masking is proving to be an effective strategy in reducing the
risk of data exposure from both inside and outside an organization,
and must be considered a norm for provisioning non-production
databases. Effective data masking requires data to be altered in
such a way that actual values are re-engineered, while retaining the
functional and structural meaning of the data, so that it can be used
in a meaningful way without compromising on security.
Some key aspects involved in the masking of data include:
• encryption of data
• ensuring relational integrity
• establishing security policies so as to define the boundaries
between the administration and the actual user of the data
Data masking solutions should provide for synchronizing between
different data types:
• Row-Internal Synchronization
• Table Internal Synchronization
• Table-to-Table Synchronization
What is Data Masking?
3
4
• Table-to-Table Synchronization on Primary Key
• Table-to-Table Synchronization via Third Table
• Synchronizing between Different Data types
• Cross Schema Synchronization
• Cross Database Synchronization
• Cross Server Synchronization
• Cross Platform Server Synchronization
There are a variety of masking routines that are used for different
purposes. These masking routines are based on the degree of
exposure of data and the amount of control maintained. The three
masking routines are listed below:
1. Light Masking on a Bug-Fix or Fire-Fighting Database
In order to be effective, light masking on a Bug-Fix or Fire-Fighting
Database needs to have as few changes as possible. The items
that can be safely masked in a Bug-Fix database include bank
account or credit card numbers. These numbers when used as join
keys can be used for protection. In general, any opaque
information whichngful to an external organization can be masked
in these circumstances.
2. Medium Masking on Internal Development Database
Databases that are used by internal development, testing and
training departments and have no visibility outside the organization
receive medium level of masking. Items like personally identifiable
information in databases or sensitive data like bank account
numbers are viable for medium level masking.
3. Thorough Masking on an Outsourced Database
When operational control of the test and development databases
are handed over to third-party then thorough masking of the data
is required. In such a case only real time information needs to be
passed to the remote personnel to perform their functions.
Types of Data Masking
Substitution
This technique consists of randomly replacing the contents of a
column of data with information that looks similar but is completely
Techniques used for
Data Masking
unrelated to the real details Substitution is very effective in terms of
preserving the look and feel of the existing data. The downside is
that a large store of substitutable information must be available for
each column to be substituted.
Shuffling
This technique uses existing data as its own substitution dataset
and shuffles the data in such a way that the records in the dataset
do not reveal protected details. Shuffling is similar to substitution,
except that the substitution data is derived from the column itself.
Essentially, the data in a column is randomly moved between rows,
until there is no longer any reasonable correlation with the
remaining information in the row.
Using analytical means, if the algorithm for the data shuffle can be
determined, then the data can easily be de-shuffled and its original
meaning can be known. However, shuffle rules are best used on
large tables, and they leave the look and feel of the data intact.
They are fast, but great care must be taken to use a sophisticated
algorithm to randomize the shuffling of the rows.
Number and Data Variance
The number and data variance technique modifies each number or
value in a column to some random percentage of its real value.
This technique is useful for numeric and date data only. For
example, the date field could be converted simply to a time zone
definition, thus creating a difference in the meaning of data. It offers
the advantage of providing a reasonable disguise for the data,
while still keeping the range and distribution of values in the column
within existing limits.
Encryption
This is a simple and frequently used technique for statistically
altering the data making it look realistic. This technique deforms
the data and also makes it longer. In order to be useful again, the
data needs to be decrypted, hence revealing its original meaning.
This technique offers the option of leaving the data in place and
visible to those with the appropriate key while remaining effectively
useless to anybody without the key. However, it is one of the least
useful techniques for anonymous test databases.
Truncation
This is one of the best techniques, and has the added advantage of
making the system more sophisticated and capable. Truncation simply
removes the sensitive data and retains the meaningful data structure.
However, from a test database standpoint it is one of the least
desirable techniques used for data masking. Deleting columns or
replacing the values with null is not a useful data sanitization
strategy as the test teams need to work on the data or a realistic
approximation of it.
Masking Out
Masking means data anonymizatio n where certain fields are
masked with a mask character (say X). This technique does not
allow anything to be deduced from the database as the data
content is disguised while still preserving the look and feel. It is fast
and powerful only if the data is specific and invariable. In other
cases it becomes a complex and slow process.
Selective Masking
This masking technique applies masking operations to a sample of
data in the table. The sampled rows should be retrieved randomly
from the entire contents of the table.
Challenges of Masking Data
Organizations have tried to address the following challenges with
various data masking solutions:
1. Minimizing risk: No matter what security measures are taken,
there is always a degree of risk involved in handling a large amount
of sensitive data. Data breaches can damage a company’s
reputation, increase liabilities and invite legal suits.
2. Maintaining accountability: Data breaches create negative
publicity, harm current and future business, and damage
organization’s reputation and the client’s confidence in it. It is crucial
that the organization stays accountable to all stakeholders,
customers and employees, and addresses their privacy needs
effectively.
3. Compliance with regulatory norms: Confidentiality and
privacy norms demand the protection of data against theft.
Compliance to all norms is essential to prove the company’s
commitment to its customers.
Complications of Data Masking
1. Data Utility: Masked data should look and act like real data. Data
must be fit for:
• Proper testing and development
• Application edits
• Data validations
2. Data Relationships: Must be maintained after masking on
• Database level Referential Integrity (RI)
• Application level RI
• Data Integration (Interrelated database RI)
3. Existing Business Processes: Must fit in with existing IT and
refresh processes
4. Ease of use: Must balance ease of use with need to intelligently
mask data
• Usable data that does not release sensitive information
• Knowledge of specialized IT/privacy topics and algorithmic
importance should be pre-configured and built into the masking
process
5. Customizable: Solution/Process must be capable of being
tailored to specific needs of the clients
Benefits of Data Masking
• Increases protection against data breaches. This is achieved
through-
- Defined process, procedure, and a mature system to mask
sensitive information
- Enhanced quality of data privacy, by involving compliance and
audit officers to preview data masking and protection
policies—even before actual data masking takes place
5
6
- Implementation of data masking policies and procedures in an
iterative fashion
- Use of verified data masking techniques
• Enhanced development, testing and training quality. This is
achieved through-
- Use of data masking rules and techniques to produce high
quality test and provisioning data, thus streamlining the
development process
- Customized data protection policies, specific to customer
preferences and business requirements, ranging from very
liberal to very restricted
- Use of application accelerators (as per the technology
employed) instead of custom built coding and scripting, to
lower overall maintenance costs
• Enables off-site and cross-border software development and
data sharing
• Ensures compliance with industry certifications like HIPAA,
GLBA etc., privacy legislation and policies
• Provides confidence about security issues to clients
• Leverages information sharing
In situations where it is imperative for an organization to share
sensitive data, the Oracle Data Masking Pack provides a
comprehensive easy-to-use solution, to share production data with
internal and external entities, while preventing sensitive information
from being disclosed to unauthorized parties. The solution replaces
sensitive data in databases with realistic-looking, scrubbed data
based on masking rules and conditions. Insurance companies can
now use real data to represent authentic application and database
scenarios in their testing processes, without violating privacy
policies or laws.
The Oracle Data Masking Pack enables end to end secure
automation for provisioning test databases from production in
compliance with regulations. The pack reduces risk of breaching
sensitive information when copying production data into non-
production environments during application development, testing
or data analysis.
Oracle Data Masking Pack is also integrated with Oracle
Provisioning and Patch Automation Pack in Oracle Enterprise
Manager to clone-and-mask via a single workflow. The secure, high
Data Masking Solution
With Oracle Data Masking, Oracle has developed a comprehensive
four-step approach towards implementing data masking, called
Find, Assess, Secure, and Test (FAST):
Implementing Data
Masking Solution
performance capabilities of Oracle Data Masking, combined with
the end-to-end workflow, ensures that enterprises can provision
test systems from production rapidly, instead of taking days or
weeks as in the case of separate manual processes.
Find: This phase involves identifyin g and cataloging
sensitive or regulated data across the entire enterprise.
Typically carried out by business or security analysts, this
exercise will come up with a comprehensive list of sensitive
data elements specific to the organization, and discover
associate d tables and columns across enterpris e
databases that contain the sensitive data.
Assess: In this phase, developer s or Database
Administrators (DBAs), in conjunction with business or
security analysts, identify the masking algorithms that
represent the optimal techniques to replace the original
sensitive data. Developers can leverage the existing
masking library or extend it with their own masking
routines.
Secure: In this step, the security administrator executes
the masking process to secure the sensitive data during
masking trials. Once the masking process has been
completed and verified, the DBA then hands over the
environment to the application testers. This step and the
next may be iterative.
Test: In the final step, productio n users execute
application processes to test whether the resulting masked
data can be turned over to other non-production users. If
the masking routines need to be tweaked further, the DBA
restores the database to the pre-masked state, fixes the
masking algorithms and re-executes the masking process.
To begin the process of masking data, the data elements that need
to be masked in the application must be identified. The first step
that any organization must take is to determine which data is
sensitive. Sensitive data is that which is specifically related to
certain government regulations and industry standards that govern
how it can be used or shared. Thus, the first step is for security
administrators to publish what constitutes sensitive data and get
agreement from the company’s compliance or risk officers.
A typical list of sensitive data elements may include:
Comprehensive Enterprise-
Wide Discovery of
Sensitive Data Data Masking provides several easy-to-use mechanisms for
isolating the sensitive data elements.
• Data Model driven: Typical enterprise applications, such as
E-Business Suite, PeopleSoft and Siebel, have published their
application data model as a part of their product
documentation or support knowledge base. By leveraging
published data models, data masking users can easily
associate the relevant tables and columns to mask formats to
create the mask definition.
• Application Masking Templates: Data Masking supports the
concept of application masking templates, which are XML
representations of the mask definition. Software vendors or
service providers can generate these pre-defined templates and
make them available to enterprises to enable them to import
these templates rapidly into Data Masking, and thus accelerate
the implementation process.
• Ad-hoc search: Data Masking has a robust search mechanism
that allows users to search the database quickly based on ad
hoc search patterns in order to identify tables and columns that
represent sources of sensitive data. With all its database
management capabilities, including the ability to query sample
rows from tables, Data Masking can assist enterprise users in
rapidly constructing the mask definition—the prerequisite to
masking sensitive data.
Using the combination of schema and data patterns, and augmenting
them with published application metadata models, enterprises can
develop a comprehensive data privacy catalog that captures the
sensitive data elements that exist across enterprise databases.
ISOLATING SENSITIVE DATA
FOR MASKING
Bank Account Number
Card Number (Credit or Debit Card Number)
Tax Registration Number or National Tax ID
Person Identification Number
Welfare Pension Insurance Number
Unemployment Insurance Number
Government Affiliation ID
Military Service ID
Social Insurance Number
Pension ID Number
Article Number
Civil Identifier Number
Credit Card Number
Social Security Number
Trade Union Membership Number
Person Name
Maiden Name
Business Address
Business Telephone
Number
Business Email Address
Custom Name
Employee Number
User Global Identifier
Party Number or Customer
Number
Account Name
Mail Stop
GPS Location
Student Exam Hall Ticket
Number
Club Membership ID
Library Card Number
7
8
More than being only a static list, this is a dynamic living catalog
managed by security administrators. It needs to be refreshed as
business rules and government regulations change, as well as
when applications are upgraded and patched, and new data
elements containing sensitive data are discovered.
Staying compliant with policy and government regulations while
sharing production data with non-production users has become a
critical business imperative for insurance companies. Test and
development databases will require some form of sanitization in
order to render the information content anonymous. Oracle Data
Masking is designed and optimized for today’s high volume
enterprise applications running on Oracle databases. Leveraging
the power of Oracle Enterprise Manager to manage all enterprise
databases and systems, Oracle Data Masking accelerates sensitive
data identification and executes the masking process with a simple
easy-to-use web interface that puts the power of masking in the
hands of business users and administrators.
Organizations that have implemented Oracle Data Masking to
protect sensitive data in test and development environments have
realized significant benefits in the following areas:
Conclusion
• Department of Information Technology, Ministry of
Communications and Information Technology, Government of
India http://www.mit.gov.in/content/view-it-act-2000
• Articles and white papers about Data Masking and Privacy
http://www.DataMasker.com
• Oracle Corporation data masking techniques www.oracle.com
• Financial Data at Risk in Development: A Call for Data Masking
Ponemon Institute© Research Report
• Information Security Policy awareness
http://www.informationshield.com
REFERENCES
• Reducing risk through compliance: By protecting sensitive
information when sharing production data with developers and
testers, organizations have been able to ensure that
non-production databases have remained compliant with IT
security policies while enabling developers to conduct
production-class testing.
• Increasing productivity through automation: By automating
the masking process, organizations have been able to reduce
the burden on DBAs who previously had to maintain
manually-developed masking scripts.
Write to us at marketing@niit-tech.com www.niit-tech.com
Rajesh Ravichandran is Business Analyst at NIIT Technologies Ltd. He has over 5 years of
experience in the airline industry. His expertise includes airline business know-how with
specialization in passenger solutions and services; complex business analysis; requirement
gathering and gap analysis.
About the Author
NIIT Technologies Limited
2nd
Floor, 47 Mark Lane
London - EC3R 7QQ, U.K.
Ph: +44 20 70020700
Fax: +44 20 70020701
Europe
NIIT Technologies Pte. Limited
31 Kaki Bukit Road 3
#05-13 Techlink
Singapore 417818
Ph: +65 68488300
Fax: +65 68488322
Singapore
India
NIIT Technologies Inc.,
1050 Crown Pointe Parkway
5th
Floor, Atlanta, GA 30338, USA
Ph: +1 770 551 9494
Toll Free: +1 888 454 NIIT
Fax: +1 770 551 9229
Americas
D_16_120413
About NIIT Technologies
NIIT Technologies Ltd.
Corporate Heights (Tapasya)
Plot No. 5, EFGH, Sector 126
Noida-Greater Noida Expressway
Noida – 201301, U.P., India
Ph: + 91 120 7119100
Fax: + 91 120 7119150
NIIT Technologies is a leading IT solutions organization, servicing customers in North America,
Europe, Asia and Australia. It offers services in Application Development and Maintenance,
Enterprise Solutions including Managed Services and Business Process Outsourcing to
organisations in the Financial Services, Travel & Transportation, Manufacturing/Distribution, and
Government sectors. With employees over 7,000 professionals, NIIT Technologies follows global
standards of software development processes.
Over the years the Company has forged extremely rewarding relationships with global majors, a
testimony to mutual commitment and its ability to retain marquee clients, drawing repeat
business from them. NIIT Technologies has been able to scale its interactions with marquee
clients in the BFSI sector, the Travel Transport & Logistics and Manufacturing & Distribution, into
extremely meaningful, multi-year "collaborations.
NIIT Technologies follows global standards of development, which include ISO 9001:2000
Certification, assessment at Level 5 for SEI-CMMi version 1.2 and ISO 27001 information
security management certification. Its data center operations are assessed at the international
ISO 20000 IT management standards.
A leading IT solutions organization | 21 locations and 16 countries | 8000 professionals | Level 5 of SEI-CMMi, ver1.2
ISO 27001 certified | Level 5 of People CMM Framework

More Related Content

What's hot

Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET Journal
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...amna alhabib
 
Urika-GD Product Brief Online 5-page
Urika-GD Product Brief Online 5-pageUrika-GD Product Brief Online 5-page
Urika-GD Product Brief Online 5-pageAdnan Khaleel
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudIOSR Journals
 
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Denny Lee
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40Ulf Mattsson
 
Data Lake-based Approaches to Regulatory-Driven Technology Challenges
Data Lake-based Approaches to Regulatory-Driven Technology ChallengesData Lake-based Approaches to Regulatory-Driven Technology Challenges
Data Lake-based Approaches to Regulatory-Driven Technology ChallengesBooz Allen Hamilton
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET Journal
 
Lecture 02 - The Data Warehouse Environment
Lecture 02 - The Data Warehouse Environment Lecture 02 - The Data Warehouse Environment
Lecture 02 - The Data Warehouse Environment phanleson
 
Data Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big DataData Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big Datarahulmonikasharma
 
DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewAxis Technology, LLC
 

What's hot (17)

Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
IRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and TechniquesIRJET- A Study of Privacy Preserving Data Mining and Techniques
IRJET- A Study of Privacy Preserving Data Mining and Techniques
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...
 
Urika-GD Product Brief Online 5-page
Urika-GD Product Brief Online 5-pageUrika-GD Product Brief Online 5-page
Urika-GD Product Brief Online 5-page
 
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in CloudEnabling Use of Dynamic Anonymization for Enhanced Security in Cloud
Enabling Use of Dynamic Anonymization for Enhanced Security in Cloud
 
Gartner Predicts 2018
Gartner Predicts 2018Gartner Predicts 2018
Gartner Predicts 2018
 
Data masking a developer's guide
Data masking a developer's guideData masking a developer's guide
Data masking a developer's guide
 
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)
 
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Data security to protect pci data flow   ulf mattsson - insecure-mag-40Data security to protect pci data flow   ulf mattsson - insecure-mag-40
Data security to protect pci data flow ulf mattsson - insecure-mag-40
 
Data Lake-based Approaches to Regulatory-Driven Technology Challenges
Data Lake-based Approaches to Regulatory-Driven Technology ChallengesData Lake-based Approaches to Regulatory-Driven Technology Challenges
Data Lake-based Approaches to Regulatory-Driven Technology Challenges
 
IRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big DataIRJET- Improving the Performance of Smart Heterogeneous Big Data
IRJET- Improving the Performance of Smart Heterogeneous Big Data
 
Lecture 02 - The Data Warehouse Environment
Lecture 02 - The Data Warehouse Environment Lecture 02 - The Data Warehouse Environment
Lecture 02 - The Data Warehouse Environment
 
Data Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big DataData Anonymization for Privacy Preservation in Big Data
Data Anonymization for Privacy Preservation in Big Data
 
big data
big databig data
big data
 
DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking Overview
 
Ijcatr04051015
Ijcatr04051015Ijcatr04051015
Ijcatr04051015
 

Viewers also liked

10 Essential Steps Before Start Building Your Brand Story!
10 Essential Steps Before Start Building Your Brand Story!10 Essential Steps Before Start Building Your Brand Story!
10 Essential Steps Before Start Building Your Brand Story!The Story House
 
Agility in Insurance - Whitepaper
Agility in Insurance - WhitepaperAgility in Insurance - Whitepaper
Agility in Insurance - WhitepaperNIIT Technologies
 
Spagyrics and Herbal Alchemy
Spagyrics and Herbal AlchemySpagyrics and Herbal Alchemy
Spagyrics and Herbal AlchemySuperman Herbs
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNIIT Technologies
 
Overview of JPA (Java Persistence API) v2.0
Overview of JPA (Java Persistence API) v2.0Overview of JPA (Java Persistence API) v2.0
Overview of JPA (Java Persistence API) v2.0Bryan Basham
 
Heavy metals in ayurvedic drug formulations
Heavy metals in ayurvedic drug formulationsHeavy metals in ayurvedic drug formulations
Heavy metals in ayurvedic drug formulationsaniruddha kulkarni
 
Ayurveda alchemy -Dr.Rakshe
Ayurveda alchemy -Dr.RaksheAyurveda alchemy -Dr.Rakshe
Ayurveda alchemy -Dr.RaksheDr Vikas Chothe
 

Viewers also liked (12)

10 Essential Steps Before Start Building Your Brand Story!
10 Essential Steps Before Start Building Your Brand Story!10 Essential Steps Before Start Building Your Brand Story!
10 Essential Steps Before Start Building Your Brand Story!
 
Medicine, Art, Alchemy
Medicine, Art, AlchemyMedicine, Art, Alchemy
Medicine, Art, Alchemy
 
Agility in Insurance - Whitepaper
Agility in Insurance - WhitepaperAgility in Insurance - Whitepaper
Agility in Insurance - Whitepaper
 
Therapeutic areas expertise Alchemy Clinical Research Services
Therapeutic areas expertise Alchemy Clinical Research ServicesTherapeutic areas expertise Alchemy Clinical Research Services
Therapeutic areas expertise Alchemy Clinical Research Services
 
Spagyrics and Herbal Alchemy
Spagyrics and Herbal AlchemySpagyrics and Herbal Alchemy
Spagyrics and Herbal Alchemy
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
 
Overview of JPA (Java Persistence API) v2.0
Overview of JPA (Java Persistence API) v2.0Overview of JPA (Java Persistence API) v2.0
Overview of JPA (Java Persistence API) v2.0
 
Heavy metals in ayurvedic drug formulations
Heavy metals in ayurvedic drug formulationsHeavy metals in ayurvedic drug formulations
Heavy metals in ayurvedic drug formulations
 
Rasashastra ppt -part 1
Rasashastra ppt  -part 1Rasashastra ppt  -part 1
Rasashastra ppt -part 1
 
Ayurveda alchemy -Dr.Rakshe
Ayurveda alchemy -Dr.RaksheAyurveda alchemy -Dr.Rakshe
Ayurveda alchemy -Dr.Rakshe
 
Bhasma nano
Bhasma  nanoBhasma  nano
Bhasma nano
 
Ayurveda
AyurvedaAyurveda
Ayurveda
 

Similar to Data masking techniques for Insurance

IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET Journal
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...JPINFOTECH JAYAPRAKASH
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...IEEEGLOBALSOFTTECHNOLOGIES
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
Article data-centric security key to cloud and digital business
Article   data-centric security key to cloud and digital businessArticle   data-centric security key to cloud and digital business
Article data-centric security key to cloud and digital businessUlf Mattsson
 
The Champion Supervisor
The Champion SupervisorThe Champion Supervisor
The Champion SupervisorHassan Rizwan
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET Journal
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
A survey on data security in data warehousing1
A survey on data security in data warehousing1A survey on data security in data warehousing1
A survey on data security in data warehousing1Rezgar Mohammad
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing Rezgar Mohammad
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...IRJET Journal
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Similar to Data masking techniques for Insurance (20)

IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVMIRJET-  	  Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
IRJET- Efficient Privacy-Preserving using Novel Based Secure Protocol in SVM
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
50120140507005
5012014050700550120140507005
50120140507005
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT A privacy leakage upper bound constra...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Article data-centric security key to cloud and digital business
Article   data-centric security key to cloud and digital businessArticle   data-centric security key to cloud and digital business
Article data-centric security key to cloud and digital business
 
The Champion Supervisor
The Champion SupervisorThe Champion Supervisor
The Champion Supervisor
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud DataIRJET- Two ways Verification for Securing Cloud Data
IRJET- Two ways Verification for Securing Cloud Data
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
A survey on data security in data warehousing1
A survey on data security in data warehousing1A survey on data security in data warehousing1
A survey on data security in data warehousing1
 
A survey on data security in data warehousing
A survey on data security in data warehousing A survey on data security in data warehousing
A survey on data security in data warehousing
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

More from NIIT Technologies

NIIT Technologies Q4 FY’17
NIIT Technologies Q4 FY’17NIIT Technologies Q4 FY’17
NIIT Technologies Q4 FY’17NIIT Technologies
 
The 3 e’s of customer experience
The 3 e’s of customer experienceThe 3 e’s of customer experience
The 3 e’s of customer experienceNIIT Technologies
 
10 Lessons Learned from NIIT Technologies
10 Lessons Learned from NIIT Technologies10 Lessons Learned from NIIT Technologies
10 Lessons Learned from NIIT TechnologiesNIIT Technologies
 
NIIT Technologies delivers robust 145% growth in PAT for FY’16
NIIT Technologies delivers robust 145% growth in PAT for FY’16NIIT Technologies delivers robust 145% growth in PAT for FY’16
NIIT Technologies delivers robust 145% growth in PAT for FY’16NIIT Technologies
 
4 factors to consider before finalizing a Cargo Management System
4 factors to consider before finalizing a Cargo Management System4 factors to consider before finalizing a Cargo Management System
4 factors to consider before finalizing a Cargo Management SystemNIIT Technologies
 
Unlock value potential from Cargo Management Operations
Unlock value potential from Cargo Management OperationsUnlock value potential from Cargo Management Operations
Unlock value potential from Cargo Management OperationsNIIT Technologies
 
Results for Quarter 2 Financial Year 2015-16
Results for Quarter 2 Financial Year 2015-16Results for Quarter 2 Financial Year 2015-16
Results for Quarter 2 Financial Year 2015-16NIIT Technologies
 
New Distribution Capability benefits and challenges
New Distribution Capability benefits and challengesNew Distribution Capability benefits and challenges
New Distribution Capability benefits and challengesNIIT Technologies
 
Build consistent brand experience at the last mile
Build consistent brand experience at the last mileBuild consistent brand experience at the last mile
Build consistent brand experience at the last mileNIIT Technologies
 

More from NIIT Technologies (20)

Q2 FY'20
Q2 FY'20Q2 FY'20
Q2 FY'20
 
Q1 FY'20 Result
Q1 FY'20 ResultQ1 FY'20 Result
Q1 FY'20 Result
 
Q4 FY'19 Result
Q4 FY'19 ResultQ4 FY'19 Result
Q4 FY'19 Result
 
Q2 FY'19 Result
Q2 FY'19 ResultQ2 FY'19 Result
Q2 FY'19 Result
 
Q1 FY’19 Result
Q1 FY’19 ResultQ1 FY’19 Result
Q1 FY’19 Result
 
Q3 Results
Q3 ResultsQ3 Results
Q3 Results
 
NIIT Tech Q2 Results
NIIT Tech Q2 ResultsNIIT Tech Q2 Results
NIIT Tech Q2 Results
 
Q1 FY'18
Q1 FY'18 Q1 FY'18
Q1 FY'18
 
NIIT Technologies Q4 FY’17
NIIT Technologies Q4 FY’17NIIT Technologies Q4 FY’17
NIIT Technologies Q4 FY’17
 
The 3 e’s of customer experience
The 3 e’s of customer experienceThe 3 e’s of customer experience
The 3 e’s of customer experience
 
Q3 FY17 results
Q3 FY17 resultsQ3 FY17 results
Q3 FY17 results
 
10 Lessons Learned from NIIT Technologies
10 Lessons Learned from NIIT Technologies10 Lessons Learned from NIIT Technologies
10 Lessons Learned from NIIT Technologies
 
NIIT Tech - Q1 FY17
NIIT Tech - Q1 FY17NIIT Tech - Q1 FY17
NIIT Tech - Q1 FY17
 
NIIT Technologies delivers robust 145% growth in PAT for FY’16
NIIT Technologies delivers robust 145% growth in PAT for FY’16NIIT Technologies delivers robust 145% growth in PAT for FY’16
NIIT Technologies delivers robust 145% growth in PAT for FY’16
 
Dynamic UX Ecosystem
Dynamic UX EcosystemDynamic UX Ecosystem
Dynamic UX Ecosystem
 
4 factors to consider before finalizing a Cargo Management System
4 factors to consider before finalizing a Cargo Management System4 factors to consider before finalizing a Cargo Management System
4 factors to consider before finalizing a Cargo Management System
 
Unlock value potential from Cargo Management Operations
Unlock value potential from Cargo Management OperationsUnlock value potential from Cargo Management Operations
Unlock value potential from Cargo Management Operations
 
Results for Quarter 2 Financial Year 2015-16
Results for Quarter 2 Financial Year 2015-16Results for Quarter 2 Financial Year 2015-16
Results for Quarter 2 Financial Year 2015-16
 
New Distribution Capability benefits and challenges
New Distribution Capability benefits and challengesNew Distribution Capability benefits and challenges
New Distribution Capability benefits and challenges
 
Build consistent brand experience at the last mile
Build consistent brand experience at the last mileBuild consistent brand experience at the last mile
Build consistent brand experience at the last mile
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Data masking techniques for Insurance

  • 1. Data Masking Techniques for InsuranceData Masking Techniques for Insurance www.niit-tech.com Lalit Mittal NIIT Technologies White Paper
  • 2. CONTENTS Introduction 3 What is Data Masking? 3 Types of Data Masking 4 Techniques used for Data Masking 4 • Challenges of Masking Data 5 • Complications of Data Masking 5 • Benefits of Data Masking 5 Data Masking Solution 6 Implementing Data Masking Solution 6 Comprehensive Enterprise-wide Discovery of Sensitive Data 7 Isolating Sensitive Data for Masking 7 Conclusion 8 References 8 About the Author 9 About Niit Technologies 9
  • 3. Insurance companies are using technolog y to manage communication , processes, storage and security. Information Technology (IT) solutions are no longer just a business enabler but an integral part of providing enhanced customer service. IT is crucial to managing information efficiently and effectively. However, an overlooked risk for insurance companies is the vulnerability of personal and business information used for testing and application development. Many organizations use real data during the test and developmen t phase of new software applications. This includes financial records, transac tional records, and other Personally Identifiable Information (PII). Further, test environments are less secure because data is exposed to a variety of unauthorized sources, including in-house testing staff, consultants, partners and offshore development personnel. As insurance companies are highly regulated, the use of real data for testing and development may be putting them at risk of non-compliance with international regulations. Research has also found that customer loyalty towards insurance companies is dependent upon the perception that the institution is taking every measure to protect the customers’ personal financial information. Hence insurance organizations must have strict governance over: • Types of real data used in application testing and development • Information security precautions and responsibilities • Use of cloud computing, distributed computing and outsourced services, • Experience with data breaches involving real consumer data This whitepaper explores the various data masking techniques and the best practices of protecting sensitive data. Introduction Data Masking is the process of replacing existing sensitive information in test or development databases with information that is realistic but not real. Data masking techniques will obscure specific data within a database table ensuring data security is maintained. The data masking is applied across applications and environments in order to maintain business integrity. Data is de-identified to ensure that sensitive customer information is not leaked outside of authorized environments. It must be provided at non-production environments as new data processing environments gets built. The new environment has to be created using data that is authenticated and genuinely useful. This ensures that new initiatives will work as they have been evolved on data that reflects real-world scenarios. Data masking is proving to be an effective strategy in reducing the risk of data exposure from both inside and outside an organization, and must be considered a norm for provisioning non-production databases. Effective data masking requires data to be altered in such a way that actual values are re-engineered, while retaining the functional and structural meaning of the data, so that it can be used in a meaningful way without compromising on security. Some key aspects involved in the masking of data include: • encryption of data • ensuring relational integrity • establishing security policies so as to define the boundaries between the administration and the actual user of the data Data masking solutions should provide for synchronizing between different data types: • Row-Internal Synchronization • Table Internal Synchronization • Table-to-Table Synchronization What is Data Masking? 3
  • 4. 4 • Table-to-Table Synchronization on Primary Key • Table-to-Table Synchronization via Third Table • Synchronizing between Different Data types • Cross Schema Synchronization • Cross Database Synchronization • Cross Server Synchronization • Cross Platform Server Synchronization There are a variety of masking routines that are used for different purposes. These masking routines are based on the degree of exposure of data and the amount of control maintained. The three masking routines are listed below: 1. Light Masking on a Bug-Fix or Fire-Fighting Database In order to be effective, light masking on a Bug-Fix or Fire-Fighting Database needs to have as few changes as possible. The items that can be safely masked in a Bug-Fix database include bank account or credit card numbers. These numbers when used as join keys can be used for protection. In general, any opaque information whichngful to an external organization can be masked in these circumstances. 2. Medium Masking on Internal Development Database Databases that are used by internal development, testing and training departments and have no visibility outside the organization receive medium level of masking. Items like personally identifiable information in databases or sensitive data like bank account numbers are viable for medium level masking. 3. Thorough Masking on an Outsourced Database When operational control of the test and development databases are handed over to third-party then thorough masking of the data is required. In such a case only real time information needs to be passed to the remote personnel to perform their functions. Types of Data Masking Substitution This technique consists of randomly replacing the contents of a column of data with information that looks similar but is completely Techniques used for Data Masking unrelated to the real details Substitution is very effective in terms of preserving the look and feel of the existing data. The downside is that a large store of substitutable information must be available for each column to be substituted. Shuffling This technique uses existing data as its own substitution dataset and shuffles the data in such a way that the records in the dataset do not reveal protected details. Shuffling is similar to substitution, except that the substitution data is derived from the column itself. Essentially, the data in a column is randomly moved between rows, until there is no longer any reasonable correlation with the remaining information in the row. Using analytical means, if the algorithm for the data shuffle can be determined, then the data can easily be de-shuffled and its original meaning can be known. However, shuffle rules are best used on large tables, and they leave the look and feel of the data intact. They are fast, but great care must be taken to use a sophisticated algorithm to randomize the shuffling of the rows. Number and Data Variance The number and data variance technique modifies each number or value in a column to some random percentage of its real value. This technique is useful for numeric and date data only. For example, the date field could be converted simply to a time zone definition, thus creating a difference in the meaning of data. It offers the advantage of providing a reasonable disguise for the data, while still keeping the range and distribution of values in the column within existing limits. Encryption This is a simple and frequently used technique for statistically altering the data making it look realistic. This technique deforms the data and also makes it longer. In order to be useful again, the data needs to be decrypted, hence revealing its original meaning. This technique offers the option of leaving the data in place and visible to those with the appropriate key while remaining effectively useless to anybody without the key. However, it is one of the least useful techniques for anonymous test databases. Truncation This is one of the best techniques, and has the added advantage of making the system more sophisticated and capable. Truncation simply removes the sensitive data and retains the meaningful data structure.
  • 5. However, from a test database standpoint it is one of the least desirable techniques used for data masking. Deleting columns or replacing the values with null is not a useful data sanitization strategy as the test teams need to work on the data or a realistic approximation of it. Masking Out Masking means data anonymizatio n where certain fields are masked with a mask character (say X). This technique does not allow anything to be deduced from the database as the data content is disguised while still preserving the look and feel. It is fast and powerful only if the data is specific and invariable. In other cases it becomes a complex and slow process. Selective Masking This masking technique applies masking operations to a sample of data in the table. The sampled rows should be retrieved randomly from the entire contents of the table. Challenges of Masking Data Organizations have tried to address the following challenges with various data masking solutions: 1. Minimizing risk: No matter what security measures are taken, there is always a degree of risk involved in handling a large amount of sensitive data. Data breaches can damage a company’s reputation, increase liabilities and invite legal suits. 2. Maintaining accountability: Data breaches create negative publicity, harm current and future business, and damage organization’s reputation and the client’s confidence in it. It is crucial that the organization stays accountable to all stakeholders, customers and employees, and addresses their privacy needs effectively. 3. Compliance with regulatory norms: Confidentiality and privacy norms demand the protection of data against theft. Compliance to all norms is essential to prove the company’s commitment to its customers. Complications of Data Masking 1. Data Utility: Masked data should look and act like real data. Data must be fit for: • Proper testing and development • Application edits • Data validations 2. Data Relationships: Must be maintained after masking on • Database level Referential Integrity (RI) • Application level RI • Data Integration (Interrelated database RI) 3. Existing Business Processes: Must fit in with existing IT and refresh processes 4. Ease of use: Must balance ease of use with need to intelligently mask data • Usable data that does not release sensitive information • Knowledge of specialized IT/privacy topics and algorithmic importance should be pre-configured and built into the masking process 5. Customizable: Solution/Process must be capable of being tailored to specific needs of the clients Benefits of Data Masking • Increases protection against data breaches. This is achieved through- - Defined process, procedure, and a mature system to mask sensitive information - Enhanced quality of data privacy, by involving compliance and audit officers to preview data masking and protection policies—even before actual data masking takes place 5
  • 6. 6 - Implementation of data masking policies and procedures in an iterative fashion - Use of verified data masking techniques • Enhanced development, testing and training quality. This is achieved through- - Use of data masking rules and techniques to produce high quality test and provisioning data, thus streamlining the development process - Customized data protection policies, specific to customer preferences and business requirements, ranging from very liberal to very restricted - Use of application accelerators (as per the technology employed) instead of custom built coding and scripting, to lower overall maintenance costs • Enables off-site and cross-border software development and data sharing • Ensures compliance with industry certifications like HIPAA, GLBA etc., privacy legislation and policies • Provides confidence about security issues to clients • Leverages information sharing In situations where it is imperative for an organization to share sensitive data, the Oracle Data Masking Pack provides a comprehensive easy-to-use solution, to share production data with internal and external entities, while preventing sensitive information from being disclosed to unauthorized parties. The solution replaces sensitive data in databases with realistic-looking, scrubbed data based on masking rules and conditions. Insurance companies can now use real data to represent authentic application and database scenarios in their testing processes, without violating privacy policies or laws. The Oracle Data Masking Pack enables end to end secure automation for provisioning test databases from production in compliance with regulations. The pack reduces risk of breaching sensitive information when copying production data into non- production environments during application development, testing or data analysis. Oracle Data Masking Pack is also integrated with Oracle Provisioning and Patch Automation Pack in Oracle Enterprise Manager to clone-and-mask via a single workflow. The secure, high Data Masking Solution With Oracle Data Masking, Oracle has developed a comprehensive four-step approach towards implementing data masking, called Find, Assess, Secure, and Test (FAST): Implementing Data Masking Solution performance capabilities of Oracle Data Masking, combined with the end-to-end workflow, ensures that enterprises can provision test systems from production rapidly, instead of taking days or weeks as in the case of separate manual processes. Find: This phase involves identifyin g and cataloging sensitive or regulated data across the entire enterprise. Typically carried out by business or security analysts, this exercise will come up with a comprehensive list of sensitive data elements specific to the organization, and discover associate d tables and columns across enterpris e databases that contain the sensitive data. Assess: In this phase, developer s or Database Administrators (DBAs), in conjunction with business or security analysts, identify the masking algorithms that represent the optimal techniques to replace the original sensitive data. Developers can leverage the existing masking library or extend it with their own masking routines. Secure: In this step, the security administrator executes the masking process to secure the sensitive data during masking trials. Once the masking process has been completed and verified, the DBA then hands over the environment to the application testers. This step and the next may be iterative. Test: In the final step, productio n users execute application processes to test whether the resulting masked data can be turned over to other non-production users. If the masking routines need to be tweaked further, the DBA restores the database to the pre-masked state, fixes the masking algorithms and re-executes the masking process.
  • 7. To begin the process of masking data, the data elements that need to be masked in the application must be identified. The first step that any organization must take is to determine which data is sensitive. Sensitive data is that which is specifically related to certain government regulations and industry standards that govern how it can be used or shared. Thus, the first step is for security administrators to publish what constitutes sensitive data and get agreement from the company’s compliance or risk officers. A typical list of sensitive data elements may include: Comprehensive Enterprise- Wide Discovery of Sensitive Data Data Masking provides several easy-to-use mechanisms for isolating the sensitive data elements. • Data Model driven: Typical enterprise applications, such as E-Business Suite, PeopleSoft and Siebel, have published their application data model as a part of their product documentation or support knowledge base. By leveraging published data models, data masking users can easily associate the relevant tables and columns to mask formats to create the mask definition. • Application Masking Templates: Data Masking supports the concept of application masking templates, which are XML representations of the mask definition. Software vendors or service providers can generate these pre-defined templates and make them available to enterprises to enable them to import these templates rapidly into Data Masking, and thus accelerate the implementation process. • Ad-hoc search: Data Masking has a robust search mechanism that allows users to search the database quickly based on ad hoc search patterns in order to identify tables and columns that represent sources of sensitive data. With all its database management capabilities, including the ability to query sample rows from tables, Data Masking can assist enterprise users in rapidly constructing the mask definition—the prerequisite to masking sensitive data. Using the combination of schema and data patterns, and augmenting them with published application metadata models, enterprises can develop a comprehensive data privacy catalog that captures the sensitive data elements that exist across enterprise databases. ISOLATING SENSITIVE DATA FOR MASKING Bank Account Number Card Number (Credit or Debit Card Number) Tax Registration Number or National Tax ID Person Identification Number Welfare Pension Insurance Number Unemployment Insurance Number Government Affiliation ID Military Service ID Social Insurance Number Pension ID Number Article Number Civil Identifier Number Credit Card Number Social Security Number Trade Union Membership Number Person Name Maiden Name Business Address Business Telephone Number Business Email Address Custom Name Employee Number User Global Identifier Party Number or Customer Number Account Name Mail Stop GPS Location Student Exam Hall Ticket Number Club Membership ID Library Card Number 7
  • 8. 8 More than being only a static list, this is a dynamic living catalog managed by security administrators. It needs to be refreshed as business rules and government regulations change, as well as when applications are upgraded and patched, and new data elements containing sensitive data are discovered. Staying compliant with policy and government regulations while sharing production data with non-production users has become a critical business imperative for insurance companies. Test and development databases will require some form of sanitization in order to render the information content anonymous. Oracle Data Masking is designed and optimized for today’s high volume enterprise applications running on Oracle databases. Leveraging the power of Oracle Enterprise Manager to manage all enterprise databases and systems, Oracle Data Masking accelerates sensitive data identification and executes the masking process with a simple easy-to-use web interface that puts the power of masking in the hands of business users and administrators. Organizations that have implemented Oracle Data Masking to protect sensitive data in test and development environments have realized significant benefits in the following areas: Conclusion • Department of Information Technology, Ministry of Communications and Information Technology, Government of India http://www.mit.gov.in/content/view-it-act-2000 • Articles and white papers about Data Masking and Privacy http://www.DataMasker.com • Oracle Corporation data masking techniques www.oracle.com • Financial Data at Risk in Development: A Call for Data Masking Ponemon Institute© Research Report • Information Security Policy awareness http://www.informationshield.com REFERENCES • Reducing risk through compliance: By protecting sensitive information when sharing production data with developers and testers, organizations have been able to ensure that non-production databases have remained compliant with IT security policies while enabling developers to conduct production-class testing. • Increasing productivity through automation: By automating the masking process, organizations have been able to reduce the burden on DBAs who previously had to maintain manually-developed masking scripts.
  • 9. Write to us at marketing@niit-tech.com www.niit-tech.com Rajesh Ravichandran is Business Analyst at NIIT Technologies Ltd. He has over 5 years of experience in the airline industry. His expertise includes airline business know-how with specialization in passenger solutions and services; complex business analysis; requirement gathering and gap analysis. About the Author NIIT Technologies Limited 2nd Floor, 47 Mark Lane London - EC3R 7QQ, U.K. Ph: +44 20 70020700 Fax: +44 20 70020701 Europe NIIT Technologies Pte. Limited 31 Kaki Bukit Road 3 #05-13 Techlink Singapore 417818 Ph: +65 68488300 Fax: +65 68488322 Singapore India NIIT Technologies Inc., 1050 Crown Pointe Parkway 5th Floor, Atlanta, GA 30338, USA Ph: +1 770 551 9494 Toll Free: +1 888 454 NIIT Fax: +1 770 551 9229 Americas D_16_120413 About NIIT Technologies NIIT Technologies Ltd. Corporate Heights (Tapasya) Plot No. 5, EFGH, Sector 126 Noida-Greater Noida Expressway Noida – 201301, U.P., India Ph: + 91 120 7119100 Fax: + 91 120 7119150 NIIT Technologies is a leading IT solutions organization, servicing customers in North America, Europe, Asia and Australia. It offers services in Application Development and Maintenance, Enterprise Solutions including Managed Services and Business Process Outsourcing to organisations in the Financial Services, Travel & Transportation, Manufacturing/Distribution, and Government sectors. With employees over 7,000 professionals, NIIT Technologies follows global standards of software development processes. Over the years the Company has forged extremely rewarding relationships with global majors, a testimony to mutual commitment and its ability to retain marquee clients, drawing repeat business from them. NIIT Technologies has been able to scale its interactions with marquee clients in the BFSI sector, the Travel Transport & Logistics and Manufacturing & Distribution, into extremely meaningful, multi-year "collaborations. NIIT Technologies follows global standards of development, which include ISO 9001:2000 Certification, assessment at Level 5 for SEI-CMMi version 1.2 and ISO 27001 information security management certification. Its data center operations are assessed at the international ISO 20000 IT management standards. A leading IT solutions organization | 21 locations and 16 countries | 8000 professionals | Level 5 of SEI-CMMi, ver1.2 ISO 27001 certified | Level 5 of People CMM Framework