Questions tagged [data-security]

Data Security means protecting a database from destructive forces and the unwanted actions of unauthorized user. Data security also protects data from corruption. Data security is the main priority for organizations of every size and genre.

99 questions
1
vote
0 answers

How to secure PII data in transit from REST API to browser

In our application, Organization/Employee Information has PII (Personally identifiable information) like Bank Account Info, Social Security number etc. This data is transmitted from the REST API response to the browser. We have already following…
VINAYRAM
  • 11
  • 5
1
vote
1 answer

GDPR and personal data

I have an application mobile developed by the flutter and Firestore dB. I read somewhere that the app must respect the GDPR. My Firestore content infos user (email, PhoneNumber, image,) and infos for their stores (phones, images, position...) which…
Merym
  • 731
  • 7
  • 18
1
vote
2 answers

Is it secure to have dynamic route with order details visible to anyone with orderId?

I would like to ask if its okay to have dynamic route in my react app like this www.siteurl/orders/:id The user gets redirected to his order with his order id, which then fetch his data from db, the reason behind this is to enable order tracking and…
Lukáš Brýla
  • 680
  • 6
  • 6
1
vote
1 answer

Protecting sensitive customer data in cloud based Multi-Tenant environment

We are building a multi-tenant cloud-based web product where customer data is stored in single Database instance. There are certain portion of customer specific business data which is highly sensitive. The sensitive business data should be protected…
arasheed
  • 105
  • 1
  • 9
1
vote
0 answers

How rails communicate with remote database in a secure way?

I am using rails for my web application, I have launched my app on heroku. But i am not using heroku database instead i have purchased cpanel and have connected my rails application to a remote database(mysql and phpmyadmin). I know ssl protects…
Zia Qamar
  • 1,694
  • 1
  • 15
  • 35
1
vote
0 answers

how to forward TCP requests through a reverse proxy towards multiple data services (Mysql, hadoop, Aurora, mssql ... etc)

I'm trying to solve an architecture design puzzle, it's about designing an infra for keeping data and servers as much secured/hidden as possible, here are requirements: I want to hide the internal design of my infra (several data servers with…
1
vote
1 answer

How to detect person is typing SSN data in non masked field on client side?

I have a screen sharing application in which all sensitive data is masked. There are some scenarios in which the customer types sensitive data, such as the SSN, into a non-masked field, thereby directly compromising our solution. Is there a way I…
1
vote
2 answers

Keychain data security in jailbroken device

Storing sensitive data in keychain is a best practice in iOS. But using a jailbroken device an attacker can dump all the keychain data. (keychain-dumper) Can anyone help me understand how to protect the data in a keychain, in case of a jailbroken…
1
vote
1 answer

How far is Parse.com secured?

I recently came across Parse.com where I developed an android app for storing the data in it. But right now I have to develop a web application using the same data I previously stored. But my issue is that, parse is asking me to mention the 'app…
1
vote
2 answers

How to save contents of an object in case of error or unavailable API

I'm writing an application in which i need to keep track of how many operations are done and of what kind. When all the operations are done, this data is posted to an API. This API stores the data and with this data the company can bill the user for…
middelpat
  • 2,555
  • 1
  • 20
  • 29
1
vote
1 answer

What's standard data security practice on EC2?

We're bringing up a webapp on EC2. Our passwords are held with a strong one way hash algorithm (SHA256, many iterations). But what do people typically do for the rest of the data. Email addresses, birthdays, names and addresses. We're based in the…
user48956
  • 14,850
  • 19
  • 93
  • 154
1
vote
1 answer

Best way to define a Customized authorization policy

I am developing a project with MongoDB, I have a scenario, so that I can restrict the visibility of data to the user based on their role, for example if I have a document of the form: { "testme1":"fooo", "testme2":"foobar" } A user with role…
1
vote
2 answers

How do we make a crystal report print only specific fields based off of the user running the report?

We use a construction software, Viewpoint. We need a report to print the GL Accounts associated only with the user running the report. I was wondering if anyone had any ideas on how I could easily and efficiently achieve this? My "last-resort…
Alicia Uhacz
  • 77
  • 6
  • 20
1
vote
2 answers

Safest way to pass data between forms in c# winforms

I'm trying to remember a lesson I was taught briefly in school about safely passing data between winforms. My instructor called it pipelining, though I'm not sure if this is the correct term or merely his own name for it. He stated that his method…
jwarner112
  • 1,492
  • 2
  • 14
  • 29
0
votes
2 answers

Keeping Encrypted Strings Safe with Multiple Encrypts

A system I have been working on for a while requires DPA, and asked a question about keeping the data passcodes safe. I have since them come up with an idea to fix that, which involves having the data decrypt password for the database stored on the…
topherg
  • 4,203
  • 4
  • 37
  • 72