TAILIEUCHUNG - The Real MTCS SQL Server 2008 Exam 70/432 Prep Kit- P40

The Real MTCS SQL Server 2008 Exam 70/432 Prep Kit- P40: Congratulations on your journey to become certified in SQL Server 2008. This book will help prepare you for your exam and give you a practical view of working with SQL Server 2008. | Managing Data Encryption Chapter 5 177 based-security modules to interface with SQL server to externally manage the encryption keys as well as enable encryption and decryption. Test Day Tip Understand that TDE is not a form of access control. If someone has permission to access the database TDE will not prevent them from accessing the data. Note that they do not need permission to the DEK or a password. Database Encryption Keys Note that there are a number of encryption algorithms you may choose when you create the DEK. Not all operating systems support all types of encryptions so be sure you select an encryption scheme that is supported by the operating system you ll be using. The algorithms supported by SQL Server are WITH ALGORITHM AES_128 AES_192 AES_256 TRIPLE_DES_3KEY Best Practices for Managing Database Keys Managing SQL Server keys consists of creating deleting and modifying database keys as well as backing up and restoring database keys. To manage symmetric keys you can use the tools included in SQL Server to do the following Back up a copy of the server and database keys so that you can use them in the event a server needs to be reinstalled or for a planned migration. Restore a previously saved key to a database to a new server instance. This enables a new server instance to access existing data that it did not originally encrypt. Re-create keys and re-encrypt data in the unlikely event that the key is compromised. As a security best practice you should re-create the keys periodically to protect the server from attacks that try to decipher the keys. 178 Chapter 5 Managing Data Encryption Cell- and Column-Level Encryption Introduced in SQL Server 2005 cell-level encryption provides developers with a granular level of encryption for their applications that have specific data security requirements. While this provides the application development much flexibility it has additional performance and space costs. First of all cell- and column-level encryption .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.