StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

SQL Server Column Level Encryption - Case Study Example

Cite this document
Summary
In the paper “SQL Server Column Level Encryption” the author analyzes sensitive information and data to be protected for two major reasons. Firstly, sensitive data can be harmful to the company’s investment if it is accessed by rivals or unauthorized personnel who can use it against the firm…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
SQL Server Column Level Encryption
Read Text Preview

Extract of sample "SQL Server Column Level Encryption"

SQL Server Column Level EncryptionProblem Research firms have sensitive information and data that they must protect for two major reasons. Firstly, sensitive data can be harmful to the company’s investment if it is accessed by rivals or unauthorized personnel who can use it against the firm. Identically, exposure of sensitive data to unauthorized personnel is harmful to the parent firm as it may suffer from corporate espionage. Additionally, sensitive data may trigger other research firms to implement their replica research findings prior to the parent’s firm implementation thus leading to losses due to under par returns.

Even though firms try to encrypt data with various methods and keys, it has been noted that these companies are exposed to two major categories of threats (Jayanty, 2011). Chiefly, restricting access to sensitive information is a basic protective approach to the firm’s data. However, considering that cyber-attacks comprise of a major threat to business and research firms, it is observed that access restriction is not enough. Consequently, encrypted data and restricted access to sensitive information suffers from the possible virus attack that can destroy the data rather than expose it.

With this in mind, ABC Institute of Research and XYZ Inc. are vulnerable to losing data or having their research finding on genetics expose to their rivals. For this reason, column level encryption using symmetric keys (Aqarwal, 2011).Solution Under the circumstances defined above, when encrypting data, it is important to note that data can be accessed in two ways. Firstly, sensitive data is stored in forms of memory and anyone can have access to these memory devices. Secondly, sensitive data can be acquired from its storage device for access in another device.

As a result, data encryption should ensure that once an unauthorized personnel is able to get to the data, access to that data is not discernable using a simple query. Ordinarily, ABC and XYZ would store their research findings in various columns that comprise of genetic patterns, associations, links, and procedures of deciphering various DNA codes that all need to be encrypted. Using the SQL Server Symmetric key encryption, the SQL Server allows the encryption hierarchy that needs to be followed to the latter.

Forthwith, the hierarchy allows the creation of a master key for the SQL Server which provides the first step of encrypting the database using a password. Following the need to encrypt data, schema changes are required especially if data is varchar datatype. Ideally, the use symmetric key is to ensure that once, encrypted, the data can be accessed by the two collaborating firms through decryption. In order to access encrypted data, specified users are provided with two levels of passwords, one being the master key and second being the certificate encryption key.

Uniquely, a certificate is created as a digitally signed security object that helps in the determination of authorized and unauthorized access to a database.Advantage of the Solution The use of column level encryption provides users, in this case the research firms, the option of encrypting only the sensitive data on the various columns that may be specified within the SQL Server Database. In addition, the encrypted data can be decrypted at a later date for use by the principle firms. In favor of more secure data, column level encryption ensures that virus attacks are prevented as the encrypted data is prevented from reading, modification, or deletion (Jayanty, 2011).

Disadvantage of the Solution On contrary to the advantages of column level encryption using symmetric key, servers and databases with too many columns tend to consume too much time, time that could be put in better use had other methods been used.ReferencesAqarwal, N. (2011). SQL Server Column Level Encryption Example using Symmetric Keys. Retrieved online on May 23, 2014 from http://www.mssqltips.com/sqlservertip/2431/sql-server-column-level-encryption-example-using-symmetric-keys/Jayanty, S. (2011). Microsoft SQL Server 2008 R2 administration cookbook.

Packt Publishing Ltd.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“SQL Server Column Level Encryption Case Study Example | Topics and Well Written Essays - 500 words”, n.d.)
SQL Server Column Level Encryption Case Study Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1647415-see-attached-instructions
(SQL Server Column Level Encryption Case Study Example | Topics and Well Written Essays - 500 Words)
SQL Server Column Level Encryption Case Study Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1647415-see-attached-instructions.
“SQL Server Column Level Encryption Case Study Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1647415-see-attached-instructions.
  • Cited: 0 times

CHECK THESE SAMPLES OF SQL Server Column Level Encryption

Data Encryption

PGP completes Disk encryption from Symantec Corporation that offers organizations with complete, supreme performance complete disk encryption intended for the entire data (swap files, user files, concealed files, system files, etc.... on laptops, desktops as well as removable… This system offers business a centralized management of operations that is possible through the regular, centralized strategy enforcement by means of single web-based organization console for the entire users. PassMonster is able to carry out the insoluble job of Data encryption By Software Brief of the program and what it claims to do Specific business needs being addressed by program and value delivered by itYour reasons why you decided to check it out (first impression)Your overall evaluation of it, to the degree that you can judge; is it something youd use?...
3 Pages (750 words) Essay

DBMS Support and Security

Organizations ought to adopt security strategies, for instance, tagging data with a level of confidentiality to make sure only those permitted have access to such data (Connolly and Begg 2009).... This value refers to what strategic and planning information that the data can be used for....
5 Pages (1250 words) Research Paper

SQL&Security

sql server Security.... In asymmetric encryption, on the other hand, two keys are used.... In this encryption exchanging keys is not necessary.... encryption changes plain text data into cipher text which is unreadable by unauthorized people (Litchfield, 2003).... Hashing cannot be used instead of encryption because it does not secure the data.... An example is, in the storage of password, encryption is essential....
2 Pages (500 words) Assignment

Robot Network as a Specific Network or Server

Similarly, cryptography also goes with the same approach of upgrading the new state of the art encryption algorithms one after another and from safe to the safest, so that it cannot be cracked.... As botnets are considered as a major player in a Denial of Service attacks, it can be prevented by honey pots and bastion hosts that will identify suspicious broadcasts at the initial level.... The focus of this paper "Robot Network as a Specific Network or server" is on the reason for using an open-source operating system....
8 Pages (2000 words) Assignment

Database Management System

Parallel server technology coordinator looks individual operation in a SQL statement's execution plan and then determines way in which each row operated on in the operation should be divided or shared among the parallel execution servers.... The background activites of the database uses the online redo log so that it can recover all record changed when a failure happen through the associated instance....
4 Pages (1000 words) Coursework

Security Options

In the paper “Security Options” the author analyzes the Computer Security concentration, which focuses on basic security matters that occur in the design, study, and execution of distributed systems.... This concentration offers in-detail coverage of the hypothesis and relevance of identity....
8 Pages (2000 words) Assignment

The Nature of Encryption Exploitation Technologies

This coursework "The Nature of encryption Exploitation Technologies" gives a critical discussion of the nature and approaches of execution of the common methods that are used in the exploitation of encryption technologies, the processes of converting original information into ciphertext.... nbsp;… encryption is achieved by the use of an encryption algorithm composes of a set of formulae that converts plain text into the ciphertext format....
6 Pages (1500 words) Coursework

Tokenization vs Encryption

Creation and maintenance of tokens… Likewise, detokenization uses the same identifier to convert the tokens to the original data, which is simpler than the use of decryption key in encryption and decryption processes.... encryption" is a wonderful example of an assignment on information technology.... Simplicity Creation and maintenance of tokens are simpler than encryption since it uses a simple identifier as opposed to the encryption key....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us