Skip to Main Content
Databases Illuminated, 4th Edition
book

Databases Illuminated, 4th Edition

by Catherine M. Ricardo, Susan D. Urban, Karen C. Davis
March 2022
Intermediate to advanced content levelIntermediate to advanced
682 pages
22h 58m
English
Jones & Bartlett Learning
Content preview from Databases Illuminated, 4th Edition

8.6 Encryption

To counter the possibility of having files accessed directly through the operating system or having files stolen, data can be stored in the database in encrypted form. Only the DBMS can unscramble the data, so that anyone who obtains data by any other means will receive jumbled data. When authorized users access the information properly, the DBMS retrieves the data and decodes it automatically. Encryption should also be used whenever data is communicated to other sites, so that wiretappers will also receive scrambled data. Encryption requires a cipher system, which consists of the following components:

  • An encrypting algorithm, which takes the normal text (plaintext) as input, performs some operations on it, and produces the encrypted ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

SQL and Relational Theory, 3rd Edition

SQL and Relational Theory, 3rd Edition

C.J. Date

Publisher Resources

ISBN: 9781284231595