A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

Data Masking vs Redaction

 , updated on November 10, 2016
Data masking is the process of replacing authentic information with inauthentic information that has the same structure.
Redaction is blacking out or removing information that is personally identifiable, sensitive, confidential or classified.

Data Masking vs Redaction

Data masking and redaction are associated with different goals and methods.
Data masking is primarily associated with creating test data and training data by removing personal or confidential information from production data. The goal of data masking it to maintain the same structure of data so that it will work in applications. This often requires shuffling and replacement algorithms that leave data types such as numbers and dates intact.
Redaction is used to release human readable information without disclosing something personally identifiable or classified. For example, a study may release its detailed notes but redact the names of study participants. As such, redaction completely removes or blacks out sensitive fields or content.
Data Masking vs Redaction
Data Masking
Redaction
Definition
Removing sensitive data while maintaining the same structure so that data remains functional for processes such as testing and training.
Removing sensitive information in a secure manner such as removal, encryption or blacking out.

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Data Security

A list of common data security techniques.

Data Remanence

An overview of data remanence.

Delete vs Wipe

The difference between deleting data and wiping it.

Degaussing

A definition of degaussing as a data security technique.

Data Control

A definition of data control with examples.

Data States

An overview of the three data states.

Personal Data

Examples of the common types of personal data.

Cybersecurity Risk

An overview of cybersecurity risk at the organizational level.

Confidential Information

An overview of confidential information with examples.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map