Your enterprise is developing a database system that will contain highly sensitive data. Security of the data will take priority over database processing speed. Which database protection technique should be employed?
C. Encryption
When security of highly sensitive data takes priority over database processing speed, employing encryption is a crucial database protection technique. Encryption is the process of converting data into a secure format that can only be read or decrypted by authorized parties with the appropriate encryption keys.
Here's why encryption is a suitable choice in this scenario:
Data Security: Encryption ensures that even if unauthorized access to the database occurs, the data remains protected and unreadable without the decryption keys.
Data Confidentiality: Highly sensitive data, such as personal information, financial records, or classified information, can be kept confidential through encryption.
Data Privacy Compliance: Encryption is often a requirement for compliance with data privacy regulations, such as GDPR, HIPAA, or PCI DSS, when handling sensitive information.
Protection Against Insider Threats: Even authorized database administrators or personnel cannot access the sensitive data without proper authorization and keys.
Data at Rest and Data in Transit: Encryption can be applied to both data at rest (stored data) and data in transit (data transferred between systems), providing comprehensive security.
upvoted 1 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
dayogreats
1 year, 1 month agodayogreats
1 year, 1 month ago