Page 345 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 345

Joe                                     Smith                                 25

                Sally                                   Jones                                 28

                Bob                                     Johnson                               37

                Maria                                   Doe                                   26

               Table 5.3 shows the records after data has been swapped around,

               effectively masking the original data. Notice that this becomes a
               random set of first names, a random set of last names, and a random
               set of ages. It looks like real data, but none of the columns relates to
               each other. However, it is still possible to retrieve aggregated data
               from the table. The average age is still 29.


               TABLE 5.3 Masked data

                FirstName                               LastName                              Age

                Sally                                   Doe                                   37

                Maria                                   Johnson                               25

                Bob                                     Smith                                 28
                Joe                                     Jones                                 26


               Someone familiar with the data set may be able to reconstruct some of
               the data if the table has only three columns and only four records.
               However, this is an effective method of anonymizing data if the table
               has a dozen columns and thousands of records.


               Unlike pseudonymization and tokenization, masking cannot be
               reversed. After the data is randomized using a masking process, it
               cannot be returned to the original state.


               Administrators


               A data administrator is responsible for granting appropriate access to
               personnel. They don’t necessarily have full administrator rights and
               privileges, but they do have the ability to assign permissions.
               Administrators assign permissions based on the principles of least
               privilege and the need to know, granting users access to only what they
               need for their job.
   340   341   342   343   344   345   346   347   348   349   350