Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Encryption Rss

Search for any content tagged encryption

   Items 1 to 20 of 69    Older >>
 

Source Code Security

The code you use may contain security information. Be extra careful in this case, especially when you use encryption.  Read more...
By Steve Jones 2015/03/31 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 107 reads

Finding Encrypted Data in a SQL Server Database

The easiest way to determine if there is encrypted data in a database is to get that information from whoever wrote the application. Aside from that, there are a few things you can look for which would suggest that you have encrypted data in a given database.  Read more...
By Additional Articles 2015/01/27 | Source: MSSQLTips.com | Category: encryption
Rating: (not yet rated)  Rate this |   Briefcase | 6,997 reads

Test Your Situation

One of the important things is to be able to recover your environment. That doesn't mean you need to know everything about SQL Server and potential disasters, but you should know their affect on your situation.  Read more...
By Steve Jones 2015/01/07 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 103 reads

A Fundamental Security Mistake

Steve Jones thinks Microsoft is making a fundamental security mistake in the way they build features for the various editions of SQL Server. Read today's editorial and see if you agree.  Read more...
By Steve Jones 2014/11/03 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 403 reads

How to configure SSL encryption in SQL Server

Tibor Nagy explains how to configure Secure Sockets Layer (SSL) encryption on our SQL Servers, with a trusted certificate.  Read more...
By Additional Articles 2014/08/19 | Source: MSSQLTips.com | Category: ssl
Rating: (not yet rated)  Rate this |   Briefcase | 10,329 reads

Getting Started with Hashing in SQL Server

Encryption brings data into a state which cannot be interpreted by anyone who does not have access to the decryption key, password, or certificates. Hashing brings a string of characters of arbitrary size into a usually shorter fixed-length value or key. Here's how to get started using it.  Read more...
By Additional Articles 2014/08/06 | Source: Database Journal | Category: hashing
Rating:  Rate this |   Briefcase | 9,247 reads

Granular or Cell Level Encryption in SQL Server

Arshad Ali demonstrates granular level encryption in detail and explains how it differs from Transparent Data Encryption (TDE).  Read more...
By Additional Articles 2014/07/04 | Source: Database Journal | Category: encryption
Rating: (not yet rated)  Rate this |   Briefcase | 5,388 reads

Using Encrypted Backups in SQL Server 2014

This article details encrypted backups and how they are implemented in SQL Server 2014.  Read more...
By Perry Whittle 2014/05/15 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 2,444 reads

Administering Database Master Keys in SQL Server

A short piece that gives you the basics of how to administer the database master keys that form the basis for encryption inside of your databases.  Read more...
By Steve Jones 2014/05/12 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 3,754 reads

How much overhead does encryption add to a SQL Server query

If you have been in the information technology industry long enough, you have probably heard the expression "this adds overhead" when discussing any extra processing added on to what is considered normal processing. Dallas Snider answers the question of additional overhead caused by encryption.  Read more...
By Additional Articles 2014/04/09 | Source: MSSQLTips.com | Category: encryption
Rating: (not yet rated)  Rate this |   Briefcase | 3,785 reads

Database Master Key Error After Database Restore

When restoring a database to another server, you may get a master key error if using symmetric keys   Read more...
Rating: |  Discuss |   Briefcase | 3,507 reads

Encrypt Everything

Yahoo recently announced they are encrypting their traffic between data centers. Steve Jones thinks we should encrypt all traffic.  Read more...
By Steve Jones 2013/12/16 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 305 reads

Encrypting SQL Code

This Friday's poll looks at the encryption options for your code in SQL Server. Steve Jones asks if there is a benefit for these routines.  Read more...
By Steve Jones 2013/11/04 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 586 reads

Using Views to Expose Encrypted Data in SQL Server

I'm using SQL Server's built-in encryption to hide data in one of my SQL Server databases, but this is a reporting system and my end users need to be able to query the data without having to remember the specialized decryption functions. Is there a way to do this? Yes, there is, via the use of views.  Read more...
By Additional Articles 2013/10/29 | Source: MSSQLTips.com | Category: views
Rating:  Rate this |   Briefcase | 4,174 reads

Understanding the importance of key length with the SQL Server asymmetric encryption algorithms

K. Brian Kelly is trying to use SQL Server's built-in encryption and sees there are three different options available for an asymmetric key, corresponding to key length. What's the impact of the key length?  Read more...
By Additional Articles 2013/08/12 | Source: MSSQLTips.com | Category: encryption
Rating: (not yet rated)  Rate this |   Briefcase | 2,786 reads

Encrypting and Decrypting SQL Server Stored Procedures, Views and User-Defined Functions

Some companies put business or application logic in SQL Server using stored procedures, views and functions to return values to the calling applications or perform tasks. This is not unusual in companies that use the SQL Server layer to perform business tasks, such as finance operations, or incorporate application functionality into the programmability layer. Here's a tip to preserve secrecy on some procedures, views or functions in order to maintain security.  Read more...
By Additional Articles 2013/07/16 | Source: MSSQLTips.com | Category: stored procedures
Rating: (not yet rated)  Rate this |   Briefcase | 3,146 reads

Algorithm Secrecy is not Security

This week Steve Jones talks encryption and why you shouldn't be implementing anything you've invented.  Read more...
By Steve Jones 2013/03/18 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 148 reads

Securing SQL Server: Vulnerabilities You Might Not Have Considered

A short look at the vulnerabilities your data may be susceptible to outside of the database tables.   Read more...
By Ashvin Kamaraju 2013/03/07 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 5,814 reads

Data Insecurity: A Perspective on Data Encryption

The focus of this paper is on the protection of PII data stored within a database using encryption technologies.  Read more...
By Ron Johnson 2013/03/07 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 1,605 reads

Encryption Not Restriction

Encryption keys for services in the cloud should be maintained by the customer, according to Steve Jones. It's actually a good idea for all of your data.  Read more...
By Steve Jones 2013/01/22 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 111 reads
   Items 1 to 20 of 69    Older >>