Securing Logs of Functional Testing Infrastructure by Masking Technique

نویسندگان

چکیده

As organizations become increasingly reliant on technology and data, data protection is now a mission critical priority. Ensuring that secure uncorrupted essential for avoiding downtime, ensuring productivity, improving performance. Data keeping the i.e. confidential from being corrupted or compromised. Securing logs also when talking about protection. The testing infrastructure which outputs may contain IP address as sensitive this be misused by other employs of organization. So, masking it removing will make more can done without interference other.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Infrastructure for Securing IoT

The demands on metropolitan wireless networks is likely to change dramatically over the coming years due to the emergence of new applications and devices. The network infrastructure will need to adapt to meet these changing demands. In order to design the future infrastructure, we must first understand these workload trends and the applications that create them. In this white paper, we focus on...

متن کامل

sSCADA: securing SCADA infrastructure communications

Distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems were developed to reduce labour costs, and to allow system-wide monitoring and remote control from a central location. Control systems are widely used in critical infrastructures such as electric grid, natural gas, water and wastewater industries. While control systems can be vulnerable to a variety o...

متن کامل

Securing the information infrastructure for EV charging

We consider the functional and security requirements for the information exchanges in the infrastructure for EV charging being trialled in the Netherlands, which includes support for congestion management using the smart charging protocol OSCP. We note that current solutions do not provide true end-to-end security, even if all communication links are secured (for instance with TLS), as some dat...

متن کامل

Towards Securing Communications in Infrastructure-Poor Areas

Structured P2P networks have proven to be effective in the exchange of data between nodes whose identity and content are generally indexed in a DHT. For years, such DHT networks have allowed, among other users, third world inhabitants, such as African people, to exchange information among them and with the rest of the world without relying on a centralized infrastructure. Unfortunately, more th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of recent technology and engineering

سال: 2021

ISSN: ['2277-3878']

DOI: https://doi.org/10.35940/ijrte.a5910.0510121