Explore the fundamentals of tokenization in this 23-minute video lecture, covering key topics such as audit compliance, surrogate identifiers, and tokenization techniques for currency and data. Delve into Visa's best practices for tokenization, token mapping, and pseudonymization. Examine the ledger approach, Feistel structure, and honey encryption methods. Gain valuable insights into data protection and security measures essential for modern information systems and financial transactions.
Overview
Syllabus
Audit Compliance
Surrogate identifiers
Tokenization with currency
Tokenization with data
Visa Best Practice for Tokenization
Token Mapping
Pseudonymization
Ledger approach
Feistel structure
Honey Encryption
Taught by
Bill Buchanan OBE