A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

3 Examples of Deanonymization

 , updated on November 12, 2016
Deanonymization is the potential of identifying people in data that has been anonymized. Data is anonymized to protect individual privacy when releasing information for purposes such as value added services, disclosure, research and peer review. It can be surprisingly difficult to completely anonymize data as it is often possible to match various databases to discover identities. The following are examples of deanonymization.

Database Matching

A government releases statistical information about medical records for research purposes with personally identifiable information such as names and birth dates removed. It is later discovered that it is possible to match some people based on other databases such as the transaction records of a large pharmacy. For example, people might be identified by the combination of prescriptions they have and factors such as city.

Data Masking

A company releases an anonymous customer list to a marketing partner that has been anonymized using a weak data masking algorithm that shuffles the telephone field and replaces characters in names. The marketing company is able to reverse a few names on the list by looking at the length of names and the numbers in the phone number. From this they are able to create a reverse algorithm that unshuffles the telephone numbers to identify the customers.

Field Matching

A technology product releases anonymized data about customer media habits that includes device data such as location information. Other apps have the same data that can be used to match the people with precision.
Overview: Deanonymization
Type
Definition
The potential for anonymized data to be reversed.
Also Known As
De-anonymization
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Data Security

A list of common data security techniques.

Data Remanence

An overview of data remanence.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Masking vs Redaction

The difference between data masking and redaction.

Degaussing

A definition of degaussing as a data security technique.

Data Control

A definition of data control with examples.

Data States

An overview of the three data states.

Personal Data

Examples of the common types of personal data.

Cybersecurity Risk

An overview of cybersecurity risk at the organizational level.

Confidential Information

An overview of confidential information with examples.

Privacy By Design

An overview of privacy by design.

Expectation Of Privacy

The definition of expectation of privacy.

Personally Identifiable Information

An overview of personally identifiable information.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Risks

A definition of data risk with examples.

Personal Information

A definition of personal information with examples.

Data Subject

A definition of data subject with examples.

Machine Readable

The definition of machine readable with examples.

Delete

The definition of delete with examples.

Privacy Examples

The definition of privacy with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map