June 15, 2010 at 9:28 pm
Comments posted to this topic are about the item Encryption
June 16, 2010 at 1:09 am
I read msdn article for more than two hours.and finally answered correct and it is a complex topic and i learned some thing new about encrption.
Can any body send entire scripts to implement the cell level encrption.
Malleswarareddy
I.T.Analyst
MCITP(70-451)
June 16, 2010 at 1:15 am
Hi,
You can make this your starting point
http://www.sqlservers.net/p145498-sql-server-optimization-and-the-performance.cfm
http://msdn.microsoft.com/en-us/library/cc278098.aspx#_Toc189384682
June 16, 2010 at 6:19 am
Great question - still got it wrong, but learned a lot in doing so...
Cindy
June 16, 2010 at 7:36 am
Although my initial thought was the correct answer, I spent some time reading about a subject I don't know all that well. I went with my original thought, and learned something. Thanks.
June 16, 2010 at 8:56 am
This article, while not from MSDN, gets right to the answer and provides a good starting point.
http://www.darkreading.com/blog/archives/2009/11/cell_level_encr.html?print=true
June 16, 2010 at 9:28 am
Thanks for the question. I knew the answer but didn't feel comfortable with it because this isn't an area where I've had experience. I Marked down what my answer would be then read up on it then answered the question and got it right with my original answer. I learned a lot.
---------------------------------------------------------------------
Use Full Links:
KB Article from Microsoft on how to ask a question on a Forum
June 16, 2010 at 9:35 am
Perhaps I just got lucky, but it seemed that two of the answers were actually advantages, leaving only one as a possible disadvantage.
June 16, 2010 at 9:47 am
I agree only one of the choices seemed to be a disadvantage, which made me wonder if I was missing something.
June 16, 2010 at 10:32 am
Thanks for the question. It got me interested in this just at the time when I'm starting a project where I may have to use cell encryption. Very timely. Nice starting point. 🙂
June 16, 2010 at 4:13 pm
My first reading of the third option -- Useful in a targeted security environment -- made me think of a potential disadvantage.
Targeted, in the answers, was referring to selecting which columns required encryption and which do not.
It got me thinking, that if columns with a limited domain are encrypted, that might actually provide an attack vector.
Useful question...
June 16, 2010 at 9:24 pm
Thanks for the question.
Jason...AKA CirqueDeSQLeil
_______________________________________________
I have given a name to my pain...MCM SQL Server, MVP
SQL RNNR
Posting Performance Based Questions - Gail Shaw[/url]
Learn Extended Events
June 16, 2010 at 10:52 pm
thanks 🙂
May 31, 2011 at 1:48 am
Thanks...
Thanks
Viewing 14 posts - 1 through 13 (of 13 total)
You must be logged in to reply to this topic. Login to reply