Главная
Study mode:
on
1
Intro
2
Technical Assistance
3
PASS SUMMIT 2015
4
Speaker Bio
5
Why should we use encryption?
6
Your Goals
7
This sounds hard...
8
Hashes
9
Symmetric Keys
10
Certificates
11
Database Master Key
12
Service Master Key
13
Backup Encryption
14
Transparent Data Encryption (TDE)
15
Limitations of TDE
16
In-Transit Encryption
17
Protect Your Keys!
18
Protecting Your Keys
19
Extensible Key Management (EKM)
20
Review
Description:
Explore the critical topic of data protection through encryption in SQL Server in this 56-minute PASS Data Community Summit presentation. Learn about four key encryption methods: hashes, cell-level encryption, transparent data encryption, and backup encryption. Discover the importance of encryption in today's cybersecurity landscape, understand the different types of keys required, and gain insights on protecting the encryption keys themselves. Delve into topics such as symmetric keys, certificates, database master keys, service master keys, and extensible key management. Address common concerns about implementation difficulty and explore limitations of transparent data encryption. Gain practical knowledge to enhance your organization's data security and mitigate risks associated with potential data breaches.

Protecting Your Data with Encryption

PASS Data Community Summit
Add to list
0:00 / 0:00