Database Encryption - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Database Encryption

Description:

Access Control, Authentication, Integrity, Encryption, Auditing ... Often focused on column-level encryption. Usually broader algorithm selection ... – PowerPoint PPT presentation

Number of Views:124
Avg rating:3.0/5.0
Slides: 12
Provided by: gtg58
Category:

less

Transcript and Presenter's Notes

Title: Database Encryption


1
Database Encryption
  • Ishita Patel
  • Brandy Gallien
  • Matt Schulze
  • Muhammad Ahsan Hussain
  • Zaheer Ahmed

2
Objectives
  • Introduction
  • Algorithm Analysis
  • Performance Analysis
  • Implementation
  • Software Packages
  • Conclusion
  • Question/Comments

3
What is database security?
  • It is the system, processes, and procedures that
    protect a database from unintended activity
  • can begin with the process of creation and
    publishing of appropriate security standards for
    the database environment.
  • Several database security layers
  • Access Control, Authentication, Integrity,
    Encryption, Auditing
  • Protection of critical information data
  • Corporate financial, credit card, personal
    identity, personal health and intellectual
    property
  • Notes
  • Most debatable
  • Significant amount of research/ Varity of
    options available
  • Talk about how the encryption fits in the
    database security

Introduction
Algorithm Analysis
Performance Analysis
Implementation
Software packages
Conclusion
4
Our goal
  • Focus on database encryption
  • Awareness of the available options
  • Tradeoff between different implementation
  • Decision making

5
Algorithm Analysis
  • File Encryption
  • Database table encrypted as a whole
  • Easily Executable Simple
  • Downside Rigid Demands, Narrow Focus

6
Algorithm Analysis
  • File Encryption Problems
  • External Resources Necessary
  • Access Control Mechanisms
  • Managers Time
  • Pre-encryption organization/arrangement
  • Performance Issues on Large Databases

Introduction
Algorithm Analysis
Performance Analysis
Implementation
Software packages
Conclusion
7
Algorithm Analysis
  • Column Encryption Problems
  • Database Structure Modification
  • Datatypes within table may change
  • Schema may need alteration
  • Algorithms vary in Performance heavily
  • Intercepting and Redirecting data requests
  • Can encrypted columns be queried?

Introduction
Algorithm Analysis
Performance Analysis
Implementation
Software packages
Conclusion
8
Algorithm Analysis
  • Column Encryption
  • Encrypt only sensitive columns
  • Can work with/without Access Control
  • Flexible
  • Downside Complication

Introduction
Algorithm Analysis
Performance Analysis
Implementation
Software packages
Conclusion
9
Implementation
  • First-party tools
  • Integrated in database
  • Common methods are AES, DES, 3DES
  • Often handles automatic key storage
  • Usually transparent

Introduction
Algorithm Analysis
Performance Analysis
Implementation
Software packages
Conclusion
10
Implementation
  • Third-party tools
  • Layer over database
  • Often focused on column-level encryption
  • Usually broader algorithm selection
  • Sometimes transparent

Introduction
Algorithm Analysis
Performance Analysis
Implementation
Software packages
Conclusion
11
Conclusion
  • Lesson Learned
  • Software Bundles, for instance
  • File Encryption with Access Control
  • Column Encryption with Automatic Schema
    Modification
  • Client-side Encryption/Decryption
  • Querying Quandary
  • Other Data Obfuscations
Write a Comment
User Comments (0)
About PowerShow.com