Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified: The CompTIA Security+ Audio Course

Episode 93: Methods to Secure Data (Part 2) (Domain 3)

15 Jun 2025

Description

Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In this episode, we explore hashing, tokenization, and data masking—each serving a unique purpose in reducing data exposure while supporting operations like analytics or software testing. Hashing protects integrity and is commonly used for password storage and verification, using algorithms like SHA-256 or bcrypt to create one-way representations that can’t be reversed. Tokenization replaces sensitive fields with random or lookup-based stand-ins that preserve format but eliminate value—useful in payment systems or when storing PII. Data masking, meanwhile, modifies real data to create safe but functional test datasets, often used in development environments or user training. These methods don’t always secure the data itself—but they significantly reduce the risk of its misuse. Choosing the right technique depends on context, but all support the broader goal: protecting sensitive information without crippling functionality.

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.