摘要:
A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. A context sensing word is appended to the anonymized data. The anonymized data and the context sensing word are transmitted to the destination computing device. In one embodiment, the data includes a plurality of normal words and a plurality of stop words. A compacted stop word representative of each of the stop word and their relative position in the data is created. Anonymized normal words and anonymized compacted stop word is transmitted to the destination computing device.
摘要:
A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. The data is anonymized using the anonymization module, to derive an anonymized data, using a data encryption key. The anonymized data is transmitted to the destination computer over a network. In some embodiments, the data encryption key is encrypted and decrypted prior to anonymization.
摘要:
A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Data to be transmitted is received from a user computer. The data includes a plurality of fields of data. One or more fields of data are selected for anonymization. The selected one or more fields are anonymized. The data with one or more fields anonymized is transmitted to the destination computing device.
摘要:
A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. Anonymized data is transmitted to the destination computing device over a network.
摘要:
A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Data to be transmitted is received from a user computer. The data includes one or more characters. The data is replaced with a token representative of the data. The token is transmitted to the destination computing device over a network.
摘要:
A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. Selective anonymization of the data is performed, based on the anonymization strategy, using an anonymization module. The data includes a plurality of characters. An initialization vector is generated using a seed value, the seed value having a corresponding seed value identifier. The data is anonymized using an anonymization module, to derive an anonymized data, using the generated initialization vector. The anonymized data and the seed value identifier is transmitted to the destination computer over a network.
摘要:
A method and system for anonymizing data to be transmitted to a destination computing device is disclosed. Anonymization strategy for data anonymization is provided. Data to be transmitted is received from a user computer. The data includes a plurality of fields. One or more fields are selectively extracted. A hash using the extracted fields is computed. The computed hash is stored. Anonymization of the data is performed, using an anonymization module. Anonymized data is transmitted to the destination computing device over a network.
摘要:
In one embodiment, the present invention includes a plurality of distributed software interfaces to interface with a plurality of assets on a network. The present invention can also include an asset module to discover the plurality of assets using the plurality of distributed software interfaces and to allow a user to configure the plurality of assets, and a policy module to allow a user to apply one or more of a set of policies to one or more of the plurality of assets and to analyze compliance with the set of policies. A policy editor can allow a user to add policies to the set of policies and to edit policies in the set of policies. Furthermore, the present invention can include a reporting module to report the compliance of the one or more assets with the one or more policies based on the analysis performed by the policy module.
摘要:
A modern business enterprise will have a large number of heterogeneous assets. The risk associated with a selected asset from the heterogeneous assets can be assessed. In one embodiment, the present invention includes selecting the asset from a plurality of heterogeneous assets for risk analysis, and collecting a plurality of risk factors associated with the selected asset. The risk associated with the asset can be determined by providing the plurality of risk factors to a non-linear statistical data model to derive a risk score associated with the asset.
摘要:
Simulating risk circumstances can reveal new information to risk assessment personnel about how to mitigate risk. In one embodiment, the present invention includes selecting an asset from a plurality of heterogeneous assets of a business enterprise. The user can then input a plurality of simulated risk factors for the selected asset into the system which receives this input. The risk assessment system can then generate a non-determinative simulated risk score using the simulated risk factors, the simulated risk score being a simulated measure of risk associated with the selected asset if the selected asset were to be associated with the plurality of simulated risk factors.