{"id":2455,"date":"2019-10-15T10:16:01","date_gmt":"2019-10-15T04:46:01","guid":{"rendered":"http:\/\/blog.tenthplanet.in\/?p=2455"},"modified":"2026-03-03T10:13:10","modified_gmt":"2026-03-03T10:13:10","slug":"data-security-in-pentaho","status":"publish","type":"post","link":"https:\/\/tenthplanet.in\/blogs\/data-security-in-pentaho\/","title":{"rendered":"Protect data from threats and unauthorized access by enforcing data security methods"},"content":{"rendered":"<h3 class=\"western\"><strong><u>Introduction <\/u>:<\/strong><\/h3>\n<p class=\"western\">The amount of information stored in electronic media has increased significantly. As a business owner, it is absolutely essential that you ensure no one who is unauthorized has access to your data. Data security is to ensure the safety and protection of business data.<\/p>\n<h3 class=\"western\"><strong><u>What is Data Security<\/u>?<\/strong><\/h3>\n<p>Data Security is the process of keeping data secure and protected from unauthorized access or data breach. The main focus of data security is to make sure that data is safe and away from any destructive forces such as corruption, leakage of confidential information and violation of privacy.<\/p>\n<h3 class=\"western\"><strong><u>Data Security Methods<\/u>:<\/strong><\/h3>\n<p class=\"western\">The following are data security methods used to prevent breaches, reduce risk and sustain protections.<\/p>\n<ul>\n<li>\n<p class=\"western\">Data Masking<\/p>\n<\/li>\n<li>\n<p class=\"western\">Data Encryption<\/p>\n<\/li>\n<li>\n<p class=\"western\">Data Tokenization<\/p>\n<\/li>\n<\/ul>\n<h3 class=\"western\"><strong><u>Data Masking<\/u>:<\/strong><\/h3>\n<p class=\"western\">Data masking is a method of creating a structurally similar but inauthentic version of an organization&#8217;s data. The purpose is to protect the actual data while having a functional substitute for occasions when the real data is not required.<\/p>\n<p class=\"western\">The below table will explain masking functionality,<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2456 aligncenter\" src=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/2019\/10\/DataMasking-300x218.jpg\" alt=\"\" width=\"575\" height=\"418\" srcset=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/DataMasking-300x218.jpg 300w, https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/DataMasking.jpg 621w\" sizes=\"auto, (max-width: 575px) 100vw, 575px\" \/><\/p>\n<h3 class=\"western\"><strong><u>Data Encryption<\/u>:<\/strong><\/h3>\n<p class=\"western\">Data are encoded and can only be accessed or decrypted by a user with the correct encryption key. Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.<\/p>\n<p class=\"western\">Two main types of data encryption exist &#8211; symmetric encryption and asymmetric encryption, also known as public-key encryption.<\/p>\n<p class=\"western\">The symmetric key encryption algorithm uses the same keys for both encryption and decryption of ciphertext.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2457 aligncenter\" src=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/2019\/10\/DataEncryption-300x163.jpg\" alt=\"\" width=\"374\" height=\"203\" srcset=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/DataEncryption-300x163.jpg 300w, https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/DataEncryption.jpg 613w\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" \/><\/p>\n<p>Asymmetric key encryption, also known as public-key encryption, uses two different but mathematically linked keys, one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2458 aligncenter\" src=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/2019\/10\/DataEncryption1-300x170.jpg\" alt=\"\" width=\"362\" height=\"205\" srcset=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/DataEncryption1-300x170.jpg 300w, https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/DataEncryption1.jpg 588w\" sizes=\"auto, (max-width: 362px) 100vw, 362px\" \/><\/p>\n<h3 class=\"western\"><strong><u>Data Tokenization<\/u>:<\/strong><\/h3>\n<p class=\"western\">Tokenization is the process of turning a meaningful piece of data, such as a credit card number\/pan number, into a random number called a token that has no meaningful value if breached. Tokens serve as a reference to the original data, but cannot be used to guess those values. That\u2019s because, unlike encryption, tokenization does not use a mathematical process to transform sensitive information into the token. There is no key or algorithm, that can be used to derive the original data for a token. Instead, tokenization uses a database, called a token vault, which stores the relationship between the sensitive value and the token.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2459 aligncenter\" src=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/2019\/10\/DataTokenization-300x136.jpg\" alt=\"\" width=\"357\" height=\"162\" srcset=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/DataTokenization-300x136.jpg 300w, https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/DataTokenization.jpg 603w\" sizes=\"auto, (max-width: 357px) 100vw, 357px\" \/><\/p>\n<h3 class=\"western\"><strong><u>Data Security in Pentaho+ ETL<\/u>:<\/strong><\/h3>\n<p>With the Pentaho Plus flexible platform, secure component design, it is easy to secure data for different users. You can balance security and convenience, reduce the risk of misuse data, and still make sure all users can easily get the data they need.<\/p>\n<p>The platform makes it easy to mask\/ encrypt\/ tokenize the information to which users can view the information.<\/p>\n<h3 class=\"western\"><strong><u>Masking In Pentaho Plus ETL<\/u>:<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2463 aligncenter\" src=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/2019\/10\/M-300x172.png\" alt=\"\" width=\"349\" height=\"200\" srcset=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/M-300x172.png 300w, https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/M.png 614w\" sizes=\"auto, (max-width: 349px) 100vw, 349px\" \/><\/p>\n<h3 class=\"western\"><strong><u>Encryption In Pentaho+ ETL<\/u>:<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2462 aligncenter\" src=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/2019\/10\/E-300x101.png\" alt=\"\" width=\"333\" height=\"112\" srcset=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/E-300x101.png 300w, https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/E.png 552w\" sizes=\"auto, (max-width: 333px) 100vw, 333px\" \/><\/p>\n<h3 class=\"western\"><strong><u>Tokenization in Pentaho+ ETL<\/u>:<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2464 aligncenter\" src=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/2019\/10\/T-300x162.png\" alt=\"\" width=\"478\" height=\"258\" srcset=\"https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/T-300x162.png 300w, https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/T-768x414.png 768w, https:\/\/tenthplanet.in\/blogs\/wp-content\/uploads\/sites\/21\/2019\/10\/T.png 920w\" sizes=\"auto, (max-width: 478px) 100vw, 478px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explains the data security methods and how to implement using Pentaho Plus<\/p>\n","protected":false},"author":23,"featured_media":2507,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[424],"tags":[564,445,499,503],"class_list":["post-2455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pentaho","tag-data-security","tag-etl","tag-pentaho","tag-pentaho-data-integration"],"acf":[],"_links":{"self":[{"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/posts\/2455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/comments?post=2455"}],"version-history":[{"count":0,"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/posts\/2455\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/media\/2507"}],"wp:attachment":[{"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/media?parent=2455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/categories?post=2455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tenthplanet.in\/blogs\/wp-json\/wp\/v2\/tags?post=2455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}