Data Obfuscation
Operational Context
Tamper Proofing
Big Data Analytics
100

Data obfuscation encompasses techniques such as data __________, data swapping, and data anonymization.

Randomization

100

This person looked awesome in her Army Ball dress.

Who was Nadia?

100

The superstar student fasting the whole day.

Who is Ousmane.

100

Why is Big Data Analytics So Important?

help in providing meaningful information for making better business decisions.

200

Character scrambling of certain fields in order to prevent viewing of sensitive information.

“What is Masking Out?”

200

This technology does not provide any information regarding _____.

Threats

200

This defense against software piracy makes it possible to determine the origin of software.

What is watermarking?

200
  • Connected people produce a continuous data stream that’s deposited into a repository of connected data

What is Social Networking?

300

DO is also known as?

 Data scrambling and privacy preservation.

300

Context awareness is another way to protect data and to ensure that _______ are properly authenticated and authorized.

“What is appliances?”  or “What is the Internet of Things?”

300

Tamper-proofing contains elements of ______ and __________.

Checksums and Hashcodes.

300

The 3 Vs of big data.

What are volume, velocity and variety?

400

Sensitive data can be anonymized or replaced with realistic data to ensure data is protected as it moves between environments. 

What is SQL Provision?

400

Context awareness is another way to?

protect data

400

This type of encryption is also called asymmetric encryption.

“What is Public Key Cryptography?”

400

Big data analytics has adequate data storage, data ____/____, and fast information retrieval are other key problems in this technology.

Indexing/tagging

500

The need for this led to the development of DO techniques.

What is privacy?

500

This category gives access to contextual information about the entity the context is bound to.

What is Individuality Context?

500

What tampering proofing does?

Detect unauthorised access

500

Big data analytics create new knowledge from large-scale unstructured data or big data.

“What is Create New Knowledge?”