From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Hashing, data obfuscation, and tokenization

Hashing, data obfuscation, and tokenization

- [Instructor] Welcome to this lesson on hashing, data obfuscation, and tokenization. In this lesson, we'll first talk about hashing, and then we will talk about a handful of different data obfuscation techniques, as well as some general concepts in the category of data obfuscation. And then finally, we'll touch on what tokenization looks like. So getting into it, hashing is similar to encrypting, but in this case, the encryption is a one-way transformation. So it's incredibly important. If you don't already know this to remember, that hashing is irreversible. Some other key characteristics of hashing are that depending on what type of hashing algorithm you are using, and these are some common ones over here, regardless of how much data you put into the hashing algorithm, the idea is that you get a fixed size value on the other side of that. So for example, you might put in a couple hundred characters or you might put in a couple thousand characters. But if you're using one of these…

Contents