Q: 4
Andre, a security professional, was tasked with segregating the employees' names, phone numbers,
and credit card numbers before sharing the database with clients. For this purpose, he implemented
a deidentification technique that can replace the critical information in database fields with special
characters such as asterisks (*) and hashes (#).
Which of the following techniques was employed by Andre in the above scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.