Information Technology Reference
In-Depth Information
Figure 12.2 An example of a public-key encrypted message transmission
between Sally (the originator, with only Jim's public key) and Jim (the receiver,
using only his private key). Unauthorized interception of the message, even
with the public key, provides no useful data.
assets. Data stored on file servers and in databases may also be candidates
for encryption, to guard against data exposure through unauthorized
access to devices and file stores.
Note: Encryption of data within a relational database can have negative
consequences if it is not performed properly. Because an attribute used to
create a clustered index reorganizes the order of records within a table,
encryption of the clustered index attribute can cause the entire table to be
re-sorted every time a single value is changed, due to the re-encryption
of that attribute across all records. This can create significant processor
load and record-locking issues if it is not considered during application,
database, and encryption planning.
Secure the Applications
Security practices must also be put into place for application development
and management strategies. As with SSL requirements for Web-based access
to data, reporting tools, dashboards, and other organizational services,
Search WWH ::




Custom Search