Lecture 7 Flashcards

Introduction to Database Encryption

1
Q

What is database encryption? (!!)

A

protecting databases by converting plaintext into cyphertext, with only authorized users being able to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 common types of encryption? (!!)

A

-Transparent Data Encryption (TDE): encrypts the entire database, even backups.

-Column-Level Encryption: encrypts specific columns.
(ex: credit card column)

-Application-Level Encryption: the application encrypts data before storing it, so that it is encrypted even in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are 3 pros and cons to transparent data encryption? (!!)

A

Pros:
-Easy to use.
-Low impact on performance.
-Everything is protected.

Cons:
-Inefficient due encrypting everything.
-Losing key will make all data inaccessible.
-Not encrypted end-to-end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 3 pros and cons to column-level encryption? (!!)

A

Pros:
-Different key for each column.

-Efficiency as only sensitive data is protected.

-Compliance.

Cons:
-Lower performance due to decrypting specific columns.

-complexity: applications need to able to handle decryption.

-Key management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 3 pros and 2 cons to application-level encryption? (!!)

A

Pros:
-“end-to-end” encryption.

-Cloud Compatibility.

-Customizable: you can choose what to encrypt.

Cons:
-Performance issues: app will handle the encryption.

-Complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 3 best practices for database encryption?

A

-Strong algorithms.

-Regularly change keys.

-Restrict access to keys to mitigate insider threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is key management? (!!)

A

It’s creating, storing, and securing encryption keys to prevent risk to the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are hardware security modules (HSMs)?

A

They are devices that manage and protect encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 2 benefits of using hardware security modules (HSMs)?

A

-Strong security.
-Compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are cloud key management services? (!!)

A

They provide scalable key management solutions on the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name 3 benefits of cloud key management services: (!!)

A

-Scalability.
-Smooth Integration with other cloud services.
-Lower costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 3 key management best practices? (!!)

A

-Use dedicated key management tools.

-Restrict access to keys.

-Regularly change keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 2 future trends in database encryption? (!!)

A

-Post-quantum encryption: protects against quantum computer threats.

-Blockchain-based encryption: decentralized, tamper-proof encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption policies should cover 3 things, what are they?

A

-When and how encryption should be used.
-Who has access to the keys.
-How key management should be handled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly