in reply to Re^2: Cryptology in the database
in thread Cryptology in the database
"break into my db server" is rather vague. How would the attacker do that? You need to look at more specific attacks (for example, "tricking the database into returning data is shouldn't" and "access to arbitrary files"), calculate the chance of the attack happening, the cost of successful attack (not just financial), the costs of the possible counter-measures (again, not just financial) and the effectiveness of the possible counter-measures.
The most likely source of leaks is an SQL injection vulnerability, and encrypting the database won't help protect you from that at all since you'll happily decrypt the returned data for the attacker.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^4: Cryptology in the database
by patspam (Sexton) on Mar 31, 2008 at 09:08 UTC | |
by andreas1234567 (Vicar) on Mar 31, 2008 at 10:28 UTC | |
by jsegal (Friar) on Mar 31, 2008 at 23:23 UTC |