DKWL Abstract Book Final-Pages
DKWL Abstract Book Final-Pages
"In today’s digital era, data privacy and security have become paramount concerns for
individuals as well as organizations. The ever-increasing use of sensitive personal data by
organizations and the advancement in the field of technologies has heightened the need to
safeguard the data from adversaries, through different tools and techniques, which includes
Encryption, Pseudonymization, Access control and identity management, Risk management,
Biometric verification, etc. This paper explores the pivotal role of encryption and other cutting-
edge technologies in protecting data from unauthorized access, breaches, and cyber threats.
Encryption is the process of encoding information to render it unreadable without the proper
decryption key. By transforming plain text into ciphertext, encryption ensures that even if
unauthorized parties gain access to data, they cannot decipher its contents. We will examine
various encryption methods, including symmetric and asymmetric encryption, and their
applications in securing data at rest and in transit. Furthermore, complementary efforts of
pseudonymization, which replaces identifying information with artificial identifiers, further
enhance data privacy. Access control and identity management systems works in tandem with
encryption to ensure that only authorized users can access sensitive information. Risk
management frameworks help organizations identify potential vulnerabilities and implement
appropriate safeguards. Biometric verification adds another layer of security by using unique
physical characteristics to authenticate users. These advanced methods, combined with
traditional encryption, create a multi-faceted approach to data protection. In this paper we
would be delving deep into the intricacies of maintaining a secure state of sensitive personal
data throughout the cycle of its storage till it's processing by organizations through encryption
and embedding different technologies within it.
17