Lecture 7 Flashcards
Introduction to Database Encryption
What is database encryption? (!!)
protecting databases by converting plaintext into cyphertext, with only authorized users being able to decrypt it.
What are the 3 common types of encryption? (!!)
-Transparent Data Encryption (TDE): encrypts the entire database, even backups.
-Column-Level Encryption: encrypts specific columns.
(ex: credit card column)
-Application-Level Encryption: the application encrypts data before storing it, so that it is encrypted even in transit.
What are 3 pros and cons to transparent data encryption? (!!)
Pros:
-Easy to use.
-Low impact on performance.
-Everything is protected.
Cons:
-Inefficient due encrypting everything.
-Losing key will make all data inaccessible.
-Not encrypted end-to-end.
What are 3 pros and cons to column-level encryption? (!!)
Pros:
-Different key for each column.
-Efficiency as only sensitive data is protected.
-Compliance.
Cons:
-Lower performance due to decrypting specific columns.
-complexity: applications need to able to handle decryption.
-Key management.
What are 3 pros and 2 cons to application-level encryption? (!!)
Pros:
-“end-to-end” encryption.
-Cloud Compatibility.
-Customizable: you can choose what to encrypt.
Cons:
-Performance issues: app will handle the encryption.
-Complexity.
What are 3 best practices for database encryption?
-Strong algorithms.
-Regularly change keys.
-Restrict access to keys to mitigate insider threats.
What is key management? (!!)
It’s creating, storing, and securing encryption keys to prevent risk to the database.
What are hardware security modules (HSMs)?
They are devices that manage and protect encryption keys.
What are 2 benefits of using hardware security modules (HSMs)?
-Strong security.
-Compliance.
What are cloud key management services? (!!)
They provide scalable key management solutions on the cloud.
Name 3 benefits of cloud key management services: (!!)
-Scalability.
-Smooth Integration with other cloud services.
-Lower costs.
What are 3 key management best practices? (!!)
-Use dedicated key management tools.
-Restrict access to keys.
-Regularly change keys.
What are 2 future trends in database encryption? (!!)
-Post-quantum encryption: protects against quantum computer threats.
-Blockchain-based encryption: decentralized, tamper-proof encryption.
Encryption policies should cover 3 things, what are they?
-When and how encryption should be used.
-Who has access to the keys.
-How key management should be handled.