Database Encryption - How to Balance Security with Performance
Mattsson, Ulf T., "Database Encryption - How to Balance Security with Performance" (February 25, 2005). Available at SSRN:
Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration. Organizations must balance between the requirement for security and the desire for excellent performance. Encryption at the database level, versus application level and file level has proved to be the ideal method to protect sensitive data and deliver performance. There are a multitude of architectures and techniques to improve performance: the alternatives fall into two broad categories - alternative topologies to decrease encryption overhead and techniques to limit the number of encryption operations. In addition, performance and security, in real-world scenarios, are complex issues and experts should be used who understand all available options and the impact for each particular customer environment. Every organization must protect sensitive data or suffer potential legislative, regulatory, legal and brand consequences. Relying on perimeter security and database access control does not provide adequate security. Packaged database encryption solutions have proven to be the best alternative to protect sensitive data. This is a specialized and complex solution area and if internal resources don't have the cryptography expertise in relation to IT environment, outside expertise should be used to ensure superior performance. This paper reviews the performance aspects of three dominant topologies for database encryption.Go to article
Click here to see more on this topic.
Previous visitors have searched for information on brook log lotus notes stony university, anti spam lotus notes and ibm lotus new notes whats. We do collect this information to update our site to your needs.
Lotus Notes is used by more than 100.000 people world wide. Other e-mail clients are: Bloomba , Netscape Communicator and Becky! and other personal information manager software are: Kontact , Chandler and Aethera .