Encrypting Critical Data in Databases

NAULESH KUMAR

Abstract: Today, it is imperative for an enterprise/organization to protect critical data from both internal and external threats and ensure for security. As the incidence and severity of security breaches continues to grow, it is increasingly incumbent upon organizations to begin encrypting data inside the enterprise. Ingrian offers breakthrough solutions that make it practical to encrypt critical data, and ensure it’s secured throughout an organization. The Thesis is focus on how organizations can implement Ingrian DataSecure Platforms and employ them to encrypt critical data inside a database. Here I have discuss how critical data is encrypted in data base step by step by creating a table CUSTOMER by using SQL Query. With Ingrian DataSecure Platforms, organizations can protect critical data from both internal and external threats, and ensure compliance with legislative and policy mandates for security. Secure key management, backup, and administration are a few of the core elements for achieving true data privacy. Because Ingrian Data Secure Platforms have been built from the ground up with security in mind, implementing these policies and procedures is fast and easy, utilizing our unique management interface. We encourage administrators to focus on developing key management and administrative policies for their organizations that will provide maximum security and hope that this thesis will serve as a guide in this effort. The thesis specifies two cryptographic algorithms, the Data Encryption Standard (DES) and the Triple Data Encryption Algorithm (TDEA) which may be used by Federal organizations to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Data Encryption Standard is being made available for use by Federal agencies within the context of a total security program consisting of physical security procedures, good information management practices, and computer system/network access controls. Keywords: Data encryption, Key management, Critical Data, Data Security, Algorithm, SQL Query. Title: Encrypting Critical Data in Databases Author: NAULESH KUMAR International Journal of Computer Science and Information Technology Research ISSN 2348-1196 (print), ISSN 2348-120X (online) Research Publish Journals

Vol. 5, Issue 1, January 2017 – March 2017

Citation
Share : Facebook Twitter Linked In

Citation
Encrypting Critical Data in Databases by NAULESH KUMAR