Loading

Securing Logs of Functional Testing Infrastructure by Masking Technique
Akshata Khasge1, Nagaraja G S2

1Akshata Khasge*, Student, Department of Computer Science and Engineering, Rashtreeya Vidyalaya College of Engineering, Bengaluru (Karnataka), India.
2Nagaraja G S, Professor and Associate Dean, Department of Computer Science and Engineering, Rashtreeya Vidyalaya College of Engineering, Bengaluru (Karnataka), India. 

Manuscript received on May 17, 2021. | Revised Manuscript received on May 22, 2021. | Manuscript published on May 30, 2021. | PP: 129-132 | Volume-10 Issue-1, May 2021. | Retrieval Number: 100.1/ijrte.A59100510121 | DOI: 10.35940/ijrte.A5910.0510121
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As organizations become increasingly reliant on technology and data, data protection is now a mission critical priority. Ensuring that data is secure and uncorrupted is essential for avoiding downtime, ensuring productivity, and improving performance. Data protection is keeping the data i.e. confidential data secure from being corrupted or being compromised. Securing the data from logs also is essential when talking about data protection. The testing infrastructure which outputs logs may contain IP address as sensitive data, and this may be misused by other employs of the organization. So, by masking it or removing it from logs will make testing infrastructure more secure and testing can be done without interference of other. 
Keywords: Data Masking, Data protection, Privacy, Security.