question archive a

a

Subject:Computer SciencePrice:2.87 Bought7

a. Simple sanitization, in which all information except the commands issued by an intruder are deleted

b. Information-tracking sanitization, in which sensitive information is entered into a symbol table as it is encountered, a unique identifier is assigned, and whenever that information is encountered it is replaced with the associated identifier

c. Format sanitization, in which compressed or encoded data is transformed into its original form, the original form is sanitized using information-tracking sanitization, and the resulting data is returned to its transformed format

d. Comprehensive sanitization, in which all data is analyzed and sanitized as in information-tracking and format sanitization

Discuss the level of anonymity of each level of sanitization. Which level could be automated, and to what degree would human oversight be required?

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Answer:

1. In simple sanitization, only the intruders’ commands will be deleted. So the remaining confidential data will be at risk and vulnerable. So this method is not advisable for high confidential records and data.

2. Information-tracking is a bit securer than simple sanitization, but still it is not highly integrated or secured because if the formula for the identifier is found out, then data can be easily retrieved.

3. Format sanitization is equally secure to information-tracking sanitization.

4. Comprehensive sanitization is highly secured than the rest of all as this creates the unique identifier and encodes the identifier thus created. So this gives a highly secured environment from hacking or restoring data. This level can be automated with user-friendly software and events can be set for this sanitization process automatically with that developed software. This sanitization helps to destroy, erase or remove data from any IT assets.

 

Related Questions