Premium Essay

Nt1330 Unit 3 Assignment 3 Encryption Methods

Submitted By
Words 1011
Pages 5
I started out by researching the different types of encryption available for enterprise servers. One recommendation by the client was to use an open source type of product because of the high cost of other products. I wanted to make sure the client’s needs were met and they understood how this method compared to other methods available. There was some reluctance from the FIS vendor because open source products are normally non-supported methods. With some influencing it was agreed to provide feedback on this method to satisfy the client’s request.
GnuPG
The first encryption method analyzed for this project was the open source product called GnuPG. GnuPG allows to encrypt and sign your data and communication, features a versatile key management …show more content…
“Transparent Data Encryption (TDE) safeguards sensitive data against unauthorized access from outside of the database environment by encrypting data at rest. It prevents privileged and unauthorized operating system users from directly accessing sensitive information by inspecting the contents of database files” (Oracle, 2013).This would affect all the information in the database and would need to be agreed upon by the other businesses sharing this server. Oracle encryption does not allow encryption to be installed for only one schema so it would need to be installed across the server no matter if the other businesses are using it or not. So the cost is much higher due to the full disk encryption but does pose opportunities for other businesses to share the cost of implementation. Adding Oracle encryption would be a huge burden on the company unless they can get the other businesses within the company to share the cost. I discussed this with the database team, which already has a contract with the Oracle Company. They did not have an issue with adding this to the existing environment, but said there is a very high cost in adding this feature. In addition, there is a new license fee that must be purchased for the server because of the new technology being …show more content…
They utilize a hardware device made by the Vormetric Company in their environment. It is a hardware appliance that manages all the activity and encryption method automatically. Vormetric Data Security created the Transparent Encryption appliance that provides seamless integration of file level encryption. It provides a centralized solution that encrypts the data and controls the access to those files based on set rules. I provided how it would be implemented into the environment in Appendix I. “The company’s scalable solution suite protects any file, any database and any application — anywhere it resides — with a high performance, market-leading Vormetric Data Security Platform that incorporates application Transparent Encryption, privileged user access controls, automation and security intelligence” (Vormetric,

Similar Documents

Premium Essay

Test

...Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction to General Education / General Studies NT2580 NT2799 Communications Information...

Words: 2305 - Pages: 10

Premium Essay

Nt1230 Syllabus

...aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8