Solved

CREATE DATABASE ENCRYPTION KEY

Posted on 2016-11-06
1
56 Views
Last Modified: 2016-11-09
Hi experts

i have execute this code
USE master;
ALTER DATABASE ConfidentialDB
SET ENCRYPTION ON;

whats the mean?
i execute this select
SELECT * FROM ConfidentialDB.dbo.SecretKeys
i can view the data,

which means that the db this encrypted? what are the advantages? although the bd is encrypted I can see the data in the table
0
Comment
Question by:enrique_aeo
1 Comment
 
LVL 24

Accepted Solution

by:
Pawan Kumar earned 500 total points
ID: 41876147
Someone takes your log file, data file or back up file and take it any where so in order to make it safe we do Transparent Data Encryption.

Transparent Data Encryption (TDE) encrypts SQL Server data and log files. It performs real-time I/O encryption and decryption of the data and log files. It uses a database encryption key (DEK), which is stored in the database boot record for availability during recovery.

You can check your files @ depending on the version-

C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA
C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\Log

Read more here -

https://msdn.microsoft.com/en-us/library/bb934049.aspx
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you have heard of RFC822 date formats, they can be quite a challenge in SQL Server. RFC822 is an Internet standard format for email message headers, including all dates within those headers. The RFC822 protocols are available in detail at:   ht…
Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
This videos aims to give the viewer a basic demonstration of how a user can query current session information by using the SYS_CONTEXT function
Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now