Click here to monitor SSC
SQLServerCentral is supported by Red Gate Software Ltd.
 
Log in  ::  Register  ::  Not logged in
 
 
 

Content with tag Encryption Rss

   Items 1 to 20 of 93    Older >>
 

Double Keys

By Steve Jones 2014/04/22 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,104 reads

Decryption Keys

By Steve Jones 2014/04/15 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,307 reads

How much overhead does encryption add to a SQL Server query

If you have been in the information technology industry long enough, you have probably heard the expression "this adds overhead" when discussing any extra processing added on to what is considered normal processing. Dallas Snider answers the question of additional overhead caused by encryption.  Read more...
By Additional Articles 2014/04/09 | Source: MSSQLTips.com | Category: encryption
Rating: (not yet rated)  Rate this |   Briefcase | 2,796 reads

Symmetric Key Use

By Steve Jones 2014/04/08 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,225 reads

Database Master Key Error After Database Restore

When restoring a database to another server, you may get a master key error if using symmetric keys   Read more...
Rating: |  Discuss |   Briefcase | 2,883 reads

Symmetric Keys

One of the encryption options in SQL Server is symmetric key encryption. This is the type of encryption most people...  Read more...
By Steve Jones 2013/12/23 | Source: SQLServerCentral Blogs | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 1,373 reads

Encrypt Everything

Yahoo recently announced they are encrypting their traffic between data centers. Steve Jones thinks we should encrypt all traffic.  Read more...
By Steve Jones 2013/12/16 | Source: SQLServerCentral.com | Category: editorial
Rating: (not yet rated) |  Discuss |   Briefcase | 195 reads

Encrypting SQL Code

This Friday's poll looks at the encryption options for your code in SQL Server. Steve Jones asks if there is a benefit for these routines.  Read more...
By Steve Jones 2013/11/04 | Source: SQLServerCentral.com | Category: editorial
Rating: |  Discuss |   Briefcase | 567 reads

Using Views to Expose Encrypted Data in SQL Server

I'm using SQL Server's built-in encryption to hide data in one of my SQL Server databases, but this is a reporting system and my end users need to be able to query the data without having to remember the specialized decryption functions. Is there a way to do this? Yes, there is, via the use of views.  Read more...
By Additional Articles 2013/10/29 | Source: MSSQLTips.com | Category: views
Rating:  Rate this |   Briefcase | 3,986 reads

Alter Certificate

By Steve Jones 2013/09/12 | Category: t-sql
Rating: (not yet rated) |  Discuss |   Briefcase | 1,941 reads

Understanding the importance of key length with the SQL Server asymmetric encryption algorithms

K. Brian Kelly is trying to use SQL Server's built-in encryption and sees there are three different options available for an asymmetric key, corresponding to key length. What's the impact of the key length?  Read more...
By Additional Articles 2013/08/12 | Source: MSSQLTips.com | Category: encryption
Rating: (not yet rated)  Rate this |   Briefcase | 2,657 reads

SQL views

By Naseer Ahmad 2013/08/01 | Category: views
Rating: (not yet rated) |  Discuss |   Briefcase | 2,209 reads

TDE Setup

By Steve Jones 2013/07/26 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,606 reads

TDE Setup

By Steve Jones 2013/07/18 | Category: encryption
Rating: (not yet rated) |  Discuss |   Briefcase | 1,969 reads

Encrypting and Decrypting SQL Server Stored Procedures, Views and User-Defined Functions

Some companies put business or application logic in SQL Server using stored procedures, views and functions to return values to the calling applications or perform tasks. This is not unusual in companies that use the SQL Server layer to perform business tasks, such as finance operations, or incorporate application functionality into the programmability layer. Here's a tip to preserve secrecy on some procedures, views or functions in order to maintain security.  Read more...
By Additional Articles 2013/07/16 | Source: MSSQLTips.com | Category: stored procedures
Rating: (not yet rated)  Rate this |   Briefcase | 2,884 reads

TDE DR

By Steve Jones 2013/07/12 | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 2,220 reads

Does TDE really work on MDF files?

Yes, it does. However, let’s prove it. First let’s create a database, a table, and enter some data: -- create a...  Read more...
By Steve Jones 2013/04/26 | Source: SQLServerCentral.com | Category: blogs
Rating: (not yet rated) |  Discuss |   Briefcase | 1,649 reads

Algorithm Secrecy is not Security

This week Steve Jones talks encryption and why you shouldn't be implementing anything you've invented.  Read more...
By Steve Jones 2013/03/18 | Source: SQLServerCentral.com | Category: security
Rating: (not yet rated) |  Discuss |   Briefcase | 104 reads

Securing SQL Server: Vulnerabilities You Might Not Have Considered

A short look at the vulnerabilities your data may be susceptible to outside of the database tables.   Read more...
By Ashvin Kamaraju 2013/03/07 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 5,792 reads

Data Insecurity: A Perspective on Data Encryption

The focus of this paper is on the protection of PII data stored within a database using encryption technologies.  Read more...
By Ron Johnson 2013/03/07 | Source: SQLServerCentral.com | Category: encryption
Rating: |  Discuss |   Briefcase | 1,578 reads
   Items 1 to 20 of 93    Older >>
 
Tags
security (34)    
editorial (15)    
transparent data encryption (tde) (15)    
blogs (9)    
friday poll (9)    
t-sql (8)    
sql server 2005 (6)    
administration (4)    
certificates (4)    
editorial - ipod (4)    
editorial - wmv (4)    
sql server 2008 (4)    
editorial - mp3 (3)    
views (3)    
asymmetric keys (2)    
sql server express (2)    
stored procedures (2)    
symmetric keys (2)    
authenticators (1)    
backup / recovery (1)    
c# (1)    
cryptography (1)    
database design (1)    
database master key (dmk) (1)    
database weekly (1)    
deadlock graph trace (1)    
disaster recovery (dr) (1)    
dmv's (1)    
ekm (1)    
hashbytes (1)    
hashing (1)    
hsm (1)    
md5 (1)    
md5 function password encrypt sql 2005 (1)    
metadata (1)    
object_id (1)    
passwords (1)    
secure programming (1)    
service broker (1)    
sql server 2000 (1)    
ssl (1)    
symmetric key (1)    
with encryption (1)