Data Obfuscation
Operational Context
Tamper-Proofing
Big Data Analytics
100

Data obfuscation lets users disseminate sensitive data in a degraded form that, for  applications, permits sufficient calculation accuracy, but hides what data aspect.

Sensitive data

100

This combines hardware, firmware and software configurations

This combines hardware, firmware and software configurations

100

This method is used when searching through a large number of images with data embedded using the Patchwork method, such as when a robot is looking for copyright violations on the Internet World Wide Web (WWW).

What is Variance?

100

Big data analytics refers to?

Analyzing large volumes of data, or big data.

200

Data is randomly shuffled within the column

“What is data shuffling?”

200

Hardware/software environment in the device, the user, and the environmental constraints introduced by various stakeholders such as the _________.

Network operator

200

This happens when an attacker changes one bit and observes the consequences of that change.

What is reverse engineer breaks obfuscated software?

200

A large volume of data is injected into such a system at a high speed, while analysis and interpretation must occur at the same pace.

  • What is Incremental Processing and Approximate Result?
300

There are two types of DO encryption?

 Cryptographic DO and Network security DO

300

A security measure where data is taking out of its scope of operations is rendered useless

“What is Context Aware Security?”

300

Tamper-proofing in software engineering which protect against reverse engineering and ________.

Modifications.

300

What are volume, velocity and variety?

Hadoop

400
  • An entity who aims at finding the user’s secret by observing the outcome of the protection mechanism and minimizing the user’s privacy with respect to her privacy sensitivities.

what is Inference Attack?

400

Operational Context awareness is another way to protect data and to ensure that Internet of things (IoT) appliances or similar devices are properly?

authenticated and authorized.

400

This type of encryption only one key is used for both encryption and decryption.

“What is symmetric encryption?”

400

Big data analytics is a complex process of ________large and varied data sets.

Examining

500

: This type of Data Obfuscation Encryption inputs data encoding prior to being transferred to another encryption schema.

What is Cryptographic DO?

500
  • Any information that can be used to characterize the situation of an entity.

What is Context?

500

Tamperproofing is probably one of the most important features needed by?

 IoT

500

analyzing various sources of data is to uncover patterns and connections that might otherwise be invisible, and hopefully provide valuable insights about the users who created it.

“What is Data Mining?”