Explore more
Securing data with Make
Methods of securing data
5 min
data security helps prevent data tampering and unauthorized access while minimizing data exposure core principles of data security ensures that data has not been altered or tampered with during transmission the objective is to guarantee that the recipient receives the original document that was sent protects data from unauthorized access, ensuring that only the intended recipient can read it if someone intercepts the message, they won't be able to read the contents checks that the request is from the correct sender if the request is from someone else, the recipient can detect it and stop any data being processed importance of data security prioritizing data security is important for data protection and confidentiality prevent data breaches and protect sensitive information from unauthorized access meeting legal requirements many international and industry specific regulations mandate data encryption and strong security practices examples include gdpr (general data protection regulation), requiring technical and organizational measures to ensure data protection pci dss (payment card industry data security standard), requiring encryption of cardholder data during transmission across open, public networks consumer trust commitment to data security builds confidence with customers, partners, and stakeholders operational integrity encryption and hashing techniques secure communication and ensure that data has not been corrupted or altered security mechanisms include docid\ nr5i2u8ca8druikqrj8jo , docid\ nr5i2u8ca8druikqrj8jo , and digital signatures encryption encryption is a method of converting original data (plaintext) into an unreadable format (ciphertext) to ensure confidentiality and secure communication encryption is reversible with the correct key encryption can be symmetric (using the same key for encryption and decryption) or asymmetric (using a public key to encrypt the data and a private key to decrypt it) encyption is most often used for confidential data, like financial records, and for secure communications (tls/ssl) in {{product name}} , you can encrypt and decrypt data using aes (advanced encryption standard) or pgp (pretty good privacy) symmetric encryption uses the same key for both encrypting and decrypting messages both the sender and receiver need to have access to the identical key advantages fast performance encrypts and decrypts data quickly, making it good for large files simple implementation uses a single key for a straightforward setup disadvantages the secret key must be shared securely if someone gets the key, they can read all the encrypted data modules in {{product name}} https //apps make com/crypto#aes encrypt simple https //apps make com/crypto#aes encrypt advanced https //apps make com/crypto#aes decrypt simple https //apps make com/crypto#aes decrypt advanced asymmetric encryption uses a pair of keys the public key is used to encrypt the data and the private key is used to decrypt it the receiver shares the public key with anyone who wants to encrypt a message to them only the receiver can decrypt it using the private key that is kept secret advantages private key protected the private key used to decrypt the message is not shared supports digital signatures you can use asymmetric encryption to implement the signature and verify who sent a message and ensure it wasn't altered disadvantages slower performance it processes data more slowly than symmetric encryption it is less efficient for encrypting big files due to its complexity modules in {{product name}} https //apps make com/crypto#encrypt a pgp message https //apps make com/crypto#decrypt a pgp message hashing hashing is a one way conversion of data to verify the integrity of the data hashing is not reversible the output is called a hash value a hash value is a fixed length string of characters generated by a https //www fixlinklater com that uniquely represents the input data it is used to verify that data hasn't been changed the process is one way, meaning it's impossible to determine the original message from the hash hashing is most often used for password storage, file integrity, and digital signatures in {{product name}} , you can use the https //apps make com/crypto#create digital signature to generate a unique hash using https //help make com/text and binary functions#sha1 or https //help make com/text and binary functions#sha256 use https //www fixlinklater com in other app modules as needed