June 15, 2010 at 9:28 pm
Comments posted to this topic are about the item Encryption
June 16, 2010 at 1:09 am
I read msdn article for more than two hours.and finally answered correct and it is a complex topic and i learned some thing new about encrption.
Can any body send entire scripts to implement the cell level encrption.
Malleswarareddy
I.T.Analyst
MCITP(70-451)
June 16, 2010 at 1:15 am
Hi,
You can make this your starting point
http://www.sqlservers.net/p145498-sql-server-optimization-and-the-performance.cfm
http://msdn.microsoft.com/en-us/library/cc278098.aspx#_Toc189384682
June 16, 2010 at 6:19 am
Great question - still got it wrong, but learned a lot in doing so...
Cindy
June 16, 2010 at 7:36 am
Although my initial thought was the correct answer, I spent some time reading about a subject I don't know all that well. I went with my original thought, and learned something. Thanks.
June 16, 2010 at 8:56 am
This article, while not from MSDN, gets right to the answer and provides a good starting point.
http://www.darkreading.com/blog/archives/2009/11/cell_level_encr.html?print=true
June 16, 2010 at 9:28 am
Thanks for the question. I knew the answer but didn't feel comfortable with it because this isn't an area where I've had experience. I Marked down what my answer would be then read up on it then answered the question and got it right with my original answer. I learned a lot.
---------------------------------------------------------------------
Use Full Links:
KB Article from Microsoft on how to ask a question on a Forum
June 16, 2010 at 9:35 am
Perhaps I just got lucky, but it seemed that two of the answers were actually advantages, leaving only one as a possible disadvantage.
June 16, 2010 at 9:47 am
I agree only one of the choices seemed to be a disadvantage, which made me wonder if I was missing something.
June 16, 2010 at 10:32 am
Thanks for the question. It got me interested in this just at the time when I'm starting a project where I may have to use cell encryption. Very timely. Nice starting point.
June 16, 2010 at 4:13 pm
My first reading of the third option -- Useful in a targeted security environment -- made me think of a potential disadvantage.
Targeted, in the answers, was referring to selecting which columns required encryption and which do not.
It got me thinking, that if columns with a limited domain are encrypted, that might actually provide an attack vector.
Useful question...
June 16, 2010 at 9:24 pm
Thanks for the question.
Jason...AKA CirqueDeSQLeil
_______________________________________________
I have given a name to my pain...MCM SQL Server, MVP
SQL RNNR
Posting Performance Based Questions - Gail Shaw[/url]
Learn Extended Events
June 16, 2010 at 10:52 pm
thanks
May 31, 2011 at 1:48 am
Thanks...
Thanks
Viewing 14 posts - 1 through 13 (of 13 total)
You must be logged in to reply to this topic. Login to reply
This website stores cookies on your computer.
These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media.
To find out more about the cookies we use, see our Privacy Policy