Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Articles with tag Encryption Rss

Search for any content tagged encryption

<< Newer    Items 21 to 40 of 63    Older >>
 

Understanding Security

It is important for data professionals to understand security, but it's also important for end users that must handle data. However we have a lot of work to do to make that easier since Steve Jones thinks many IT pros struggle with this concept.  Read more...
By Steve Jones 2011/06/15 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 248 reads

TDE Setup and Administration Scripts

A comprehensive set of scripts to setup and operate TDE for a SQL Server.  Read more...
By Sean Elliott 2012/08/10 (first published: 2011/03/08) | Source: SQLServerCentral.com | Category: transparent data encryption (tde)
Rating: |  Discuss |   Briefcase | 37,048 reads

Column-Level Encryption in SQL Server

Beginning with SQL Server 2005, column-level encryption and decryption capabilities were made available within the database, providing a solution for situations where one-off types of data need to be secured beyond your existing authorization, authentication or firewall settings. This article provides an overview and example of securing a column using native SQL Server cryptography functions.  Read more...
By Additional Articles 2011/02/18 | Source: Database Journal | Category: encryption
Rating:  Rate this |   Briefcase | 4,536 reads

TDE, EKM and the Asymmetric Key

A look at how you might recover from a disaster using encryption and an HSM module in SQL Server 2008.  Read more...
By Doug Lutz 2010/06/02 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 3,014 reads

Precious Ideas

Steve Jones talks about encrypting stored procedures and why it's a bad idea. And that it's a feature that should be removed from SQL Server.  Read more...
By Steve Jones 2010/05/17 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 156 reads

Man in the MIddle

Are you worried about man in the middle attacks on your database server? If you run Oracle you should be, but SQL Server DBAs should not assume they are safe. Adding communication encryption can be a good idea for SQL Server DBAs.  Read more...
By Steve Jones 2010/04/29 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 199 reads

A Fundamental Security Mistake

Steve Jones thinks Microsoft is making a fundamental security mistake in the way they build features for the various editions of SQL Server. Read today's editorial and see if you agree.  Read more...
By Steve Jones 2009/12/21 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 166 reads

A Fundamental Security Mistake

Steve Jones thinks Microsoft is making a fundamental security mistake in the way they build features for the various editions of SQL Server. Read today's editorial and see if you agree.  Read more...
By Steve Jones 2009/12/21 | Source: SQLServerCentral.com | Category: editorial - ipod
Rating: (not yet rated)  Rate this |   Briefcase | 1,078 reads

A Fundamental Security Mistake

Steve Jones thinks Microsoft is making a fundamental security mistake in the way they build features for the various editions of SQL Server. Read today's editorial and see if you agree.  Read more...
By Steve Jones 2009/12/21 | Source: SQLServerCentral.com | Category: editorial - wmv
Rating: (not yet rated)  Rate this |   Briefcase | 966 reads

SQL Server Encryption Symmetric vs. Asymmetric Keys

I need to encrypt my data within SQL Server and I plan on using the built-in encryption functionality in SQL Server 2005 and 2008. However, I'm looking at symmetric and asymmetric key algorithms and while I see information saying to use symmetric keys, I don't understand why. What's the difference between the two and why is a symmetric key algorithm preferred over the asymmetric key ones?  Read more...
By Additional Articles 2009/12/02 | Source: MSSQLTips.com | Category: encryption
Rating:  Rate this |   Briefcase | 3,014 reads

How to simulate transparent data encryption (TDE) with SQL 2000 and 2005

Encryption of data at rest is becoming more and more crucial in today‚Äôs world. This tip is aimed to help businesses that do not have the budgets or resources to purchase hardware encryption tools or to upgrade to SQL 2008. It basically illustrates how to achive transparent file encryption with SQL 2005 or SQL 2000.  Read more...
Rating:  Rate this |   Briefcase | 3,049 reads

It's Time for Encryption

Encryption is starting to become a necessity, not an option as we work with and store more sensitive data. A guest editorial from Andy Warren comments on our fears of implementing encrpytion and why we might want to just encrypt everything.  Read more...
By Andy Warren 2009/11/03 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 200 reads

Options for hiding SQL Server code

I am aware of the WITH ENCRYPTION clause that is used to encrypt the code for objects like views, stored procedures and functions. It sort of fulfills my purpose and is easy to implement, but it does not cover all SQL Server objects. In this tip we look at another option to restrict users from viewing the definition/code of any SQL Server object.  Read more...
By Additional Articles 2009/09/08 | Source: MSSQLTips.com | Category: security
Rating:  Rate this |   Briefcase | 4,476 reads

Protecting the Encryption Keys

When you deal with encryption in your database, Steve Jones thinks you add a layer of complexity to your backup and recovery process. Do you agree? Answer today's poll.  Read more...
By Steve Jones 2009/09/04 | Source: SQLServerCentral.com | Category: editorial - ipod
Rating: (not yet rated)  Rate this |   Briefcase | 302 reads

Protecting the Encryption Keys

When you deal with encryption in your database, Steve Jones thinks you add a layer of complexity to your backup and recovery process. Do you agree? Answer today's poll.  Read more...
By Steve Jones 2009/09/04 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 206 reads

Protecting the Encryption Keys

When you deal with encryption in your database, Steve Jones thinks you add a layer of complexity to your backup and recovery process. Do you agree? Answer today's poll.  Read more...
By Steve Jones 2009/09/04 | Source: SQLServerCentral.com | Category: editorial - wmv
Rating: (not yet rated)  Rate this |   Briefcase | 298 reads

Protecting the Encryption Keys

When you deal with encryption in your database, Steve Jones thinks you add a layer of complexity to your backup and recovery process. Do you agree? Answer today's poll.  Read more...
By Steve Jones 2009/09/04 | Source: SQLServerCentral.com | Category: editorial - mp3
Rating: (not yet rated)  Rate this |   Briefcase | 271 reads

Encryptionphobia

The battle to secure personal and business data is a tough one, and the consequences of mishandling sensitive data can be severe. In this guest editorial, John Magnabosco argues that it's high time people overcame their fear of encryption.  Read more...
By JohnMagnabosco 2009/08/24 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 168 reads

Using authenticators with SQL Server encryption

Authenticators are additional data that gets encrypted along with the data to be stored in an encrypted manner. When it comes to decrypt the data, if the right authenticator isn't specified, SQL Server doesn't return the data in the decrypted form. Rather, a NULL value is returned, just as if the wrong key was used.  Read more...
By Additional Articles 2009/06/12 | Source: MSSQLTips.com | Category: encryption
Rating:  Rate this |   Briefcase | 1,869 reads

SQL Server Encryption - Hashing Collisions

A hash is a computation that transforms one set of data into another (hopefully smaller) set of data. So a hash on your 2,000 character blog post should generate a smaller, 10-20 byte value. In doing that, obviously there are many more possible 2,000...  Read more...
By Steve Jones 2009/06/09 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated)  Rate this |   Briefcase | 2,949 reads
<< Newer    Items 21 to 40 of 63    Older >>