
Ultimate access to all questions.
In your role at a leading Banking group, you're tasked with enhancing the security of customer data processing. The project involves the automated collection and processing of large datasets from various documents, which contain highly sensitive information such as credit card numbers and personal identification details. Due to strict compliance requirements, this sensitive data must not be disclosed in any form. Your team is considering several techniques to ensure data confidentiality by substituting sensitive data with surrogate characters, while maintaining the data's usability for analysis. Which of the following techniques would be most appropriate for this scenario, considering the need for data utility and compliance with data protection regulations? (Choose two options if option E is available)
A
k-anonymity, a technique designed to anonymize data in such a way that the individuals whom the data describe cannot be identified, while still allowing the data to be useful for analysis.
B
Replacement, a straightforward method that involves substituting sensitive data elements with a specified value or placeholder.
C
Format-preserving encryption (FPE), a method that encrypts data in a way that the output is in the same format as the input, such as encrypting a 16-digit credit card number into another 16-digit number.
D
Masking, a technique that replaces sensitive values with surrogate characters (e.g., hash '#' or asterisk '') to hide the actual data while preserving its format.
E
Tokenization, a process that replaces sensitive data with non-sensitive equivalents, called tokens, which have no extrinsic or exploitable meaning or value.