Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Cracking the Data Engineering Interview

You're reading from  Cracking the Data Engineering Interview

Product type Book
Published in Nov 2023
Publisher Packt
ISBN-13 9781837630776
Pages 196 pages
Edition 1st Edition
Languages
Authors (2):
Kedeisha Bryan Kedeisha Bryan
Profile icon Kedeisha Bryan
Taamir Ransome Taamir Ransome
Profile icon Taamir Ransome
View More author details

Table of Contents (23) Chapters

Preface 1. Part 1: Landing Your First Data Engineering Job
2. Chapter 1: The Roles and Responsibilities of a Data Engineer 3. Chapter 2: Must-Have Data Engineering Portfolio Projects 4. Chapter 3: Building Your Data Engineering Brand on LinkedIn 5. Chapter 4: Preparing for Behavioral Interviews 6. Part 2: Essentials for Data Engineers Part I
7. Chapter 5: Essential Python for Data Engineers 8. Chapter 6: Unit Testing 9. Chapter 7: Database Fundamentals 10. Chapter 8: Essential SQL for Data Engineers 11. Part 3: Essentials for Data Engineers Part II
12. Chapter 9: Database Design and Optimization 13. Chapter 10: Data Processing and ETL 14. Chapter 11: Data Pipeline Design for Data Engineers 15. Chapter 12: Data Warehouses and Data Lakes 16. Part 4: Essentials for Data Engineers Part III
17. Chapter 13: Essential Tools You Should Know 18. Chapter 14: Continuous Integration/Continuous Development (CI/CD) for Data Engineers 19. Chapter 15: Data Security and Privacy 20. Chapter 16: Additional Interview Questions
21. Index 22. Other Books You May Enjoy

Applying encryption methods

We’ve covered access control mechanisms and data anonymization techniques in our exploration of data security and privacy, both of which offer substantial layers of defense. What happens, though, if the data must be transmitted or stored securely but still be in its original, recognizable form for some operations? This is where encryption techniques are useful.

A data engineer’s security toolkit’s Swiss Army knife is encryption. Encryption techniques can guarantee that your data stays private and intact whether you’re storing it at rest, sending it over a network, or offering a secure method for user authentication. The different types of encryption techniques, such as symmetric and asymmetric encryption, as well as more specialized protocols such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS), will be the focus of the next subsections.

Understanding how to manage and implement encryption is essential for...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}