This article is part of an Essential Guide, our editor-selected collection of our best articles, videos and other content on this topic. Explore more in this guide:
4. - Data protection terms to know: Read more in this section
Explore other sections in this guide:
When split data is accessed, the parts are retrieved, combined and decrypted. An unauthorized person would need to know the locations of the servers containing the parts, be able to get access to each server, know what data to combine, and how to decrypt it.
Data splitting can be made even more effective by periodically retrieving and recombining the parts, and then splitting the data in a different way among different servers, and using a different encryption key. Thus, even if a hacker makes progress towards obtaining split data, chances are that the data will have been reorganized before the hacker manages to obtain all the necessary components. By rearranging the data often enough, a network administrator can stay ahead of even the most adept hacker.
Compare file splitting.