Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published May 30, 2021 | Version v1
Journal article Open

Securing Logs of Functional Testing Infrastructure by Masking Technique

  • 1. Student, Department of Computer Science and Engineering, Rashtreeya Vidyalaya College of Engineering, Bengaluru (Karnataka), India.
  • 1. Publisher

Description

As organizations become increasingly reliant on technology and data, data protection is now a mission critical priority. Ensuring that data is secure and uncorrupted is essential for avoiding downtime, ensuring productivity, and improving performance. Data protection is keeping the data i.e. confidential data secure from being corrupted or being compromised. Securing the data from logs also is essential when talking about data protection. The testing infrastructure which outputs logs may contain IP address as sensitive data, and this may be misused by other employs of the organization. So, by masking it or removing it from logs will make testing infrastructure more secure and testing can be done without interference of other.

Files

A59100510121.pdf

Files (240.6 kB)

Name Size Download all
md5:902d661e98e331f58380e59d12b5d8d5
240.6 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2277-3878 (ISSN)

Subjects

ISSN
2277-3878
Retrieval Number
100.1/ijrte.A59100510121