Is it legal for a user s information to be stored in a database without encryption?

Updated on technology 2024-04-19
5 answers
  1. Anonymous users2024-02-08

    1 Background.

    What is a password?

    A password is a technique used to obfuscate users who want to turn normal (identifiable) information into unrecognizable information. But this unrecognizable part of the information can be reprocessed and recovered and cracked. Password is a generic term for "password" in Chinese.

    2 Knowledge Anatomy.

    What is a plaintext password?

    Cleartext password, which is a password that is transmitted or saved as plaintext. Specifically, when the password is saved or transmitted over the network, the plaintext characters that are not hidden and directly displayed are used, rather than the encrypted ciphertext. If the password is 123, then the ciphertext password is *** and the plaintext password is 123.

    From an information security perspective, no network service should save or send plaintext passwords.

    What is a ciphertext password?

    Ciphertext is encrypted text, and plaintext is the text before encryption. A ciphertext is a packet that encrypts the plaintext.

    Why is it not allowed to save passwords in plaintext in the database?

    Saving passwords in plaintext has a significant security risk.

    The general database also contains the user's name, mobile phone number, user name and other information, once the database is leaked, coupled with the user's plaintext password, the attacker can use the username and password to try to log in to other ** (because often the user will set more than one ** password according to the habit to set the same), once the login is successful, it will cause more serious consequences.

  2. Anonymous users2024-02-07

    You can see if there are any relevant provisions in the Cybersecurity Law.

  3. Anonymous users2024-02-06

    It can prohibit MSSQL, MyQL, Oracle and other database files from being illegally copied and exported; Realize the backup encryption and remote destruction of database files, and realize the anti-leakage security requirements such as database files that cannot be opened when they are separated from the operating environment.

    HL-DDS database encryption software is divided into management end and control program, you need to install the control program on the machine where MSSQL, MySQL, Oracle database is installed, and the HL-DDS software can be remotely controlled by installing the management program in the local area network, after installation, all database files will be in an encrypted state, even if the files are copied out, they cannot be used. At the same time, the data backed up by mssql, mysql, and oracle enterprise manager is also encrypted, and it will not be available without the local environment, and hl-dds can prohibit mssql, mysql, and oracle components from exporting data.

  4. Anonymous users2024-02-05

    Encryption is an effective technology used by the industry to protect sensitive information. All along, the object of encryption is documents, including a variety of files, drawings, audio, etc., as the data security situation of the database system is becoming more and more severe, the need for encryption and protection of the database system is becoming more and more urgent.

    Database encryption usually refers to the encryption and protection of database data files, which is commonly referred to as storage encryption, which is mainly used to prevent data leakage caused by database dragging. Due to the application scenarios and characteristics of the database system, it is almost impossible to use the traditional encryption technology and encryption system to encrypt documents and materials to achieve data encryption protection of the database system. The objects of traditional encryption technology are usually some documents, which usually do not have a strong correlation with other application systems, and need to decrypt the encrypted documents before they can be read and processed by relevant software tools.

    The decryption process can be implemented by manual or software developer's special software, but it is usually not suitable for objects with read and write operations at any time, and is not suitable for processing large amounts of data in terms of processing performance and application scenarios. In addition, for the protected data, everyone who knows the decryption password or has the permission to use special software to operate them has exactly the same operation rights, which also limits the possibility of traditional encryption being used on a large scale and on a large scale. Due to this huge lack of transparency, performance and application scenarios, combined with the positioning and operation of the database system in the entire business system, the traditional encryption technology cannot meet the encryption requirements of the database system.

    Database encryption systems are designed for the needs of database encryption protection. (1) At the level of encryption protection, combined with the characteristics of the database system to read and write data by pages or blocks, the database encryption system is usually realized to encrypt or decrypt by page, and the encryption and decryption actions only involve those data pages or blocks with data changes, and only when these data pages or blocks are read into the shared memory of the database system are decrypted, and these data pages or blocks will be automatically encrypted when stored in the data file, so that the data in the data file can be completely guaranteed to be stored in ciphertext. It can effectively prevent dragging the library. (2) While encrypting and protecting the stored data, it can achieve complete transparency to the application system and various businesses based on the database, and in the process of use, the data protection related work is completed by the database engine, which does not require manual intervention at all, and can also ensure the performance advantages of the database system.

    3) The protection target of database encryption products is the database, which has no relationship with what kind of business and scenario the database system is applied to, so it has strong business adaptability and can be applied to any database application scenario.

  5. Anonymous users2024-02-04

    No matter what company has a lot of confidential documents and documents, with the encryption system is particularly secure, the boss can be completely assured that our company uses Haiyu, which has a particularly good encryption effect.

Related questions
20 answers2024-04-19

function updatepage(targetobject){if( == 4){

var response = ;Assign the value returned by ajax to the responseIf you want to use this variable, you can call it directly, or you can return it outside of the function. >>>More

6 answers2024-04-19

The structure of the storage is the main basis for classifying the types of copy databases. In today's Internet, databases are usually divided into two categories, namely relational and non-relational databases. >>>More

9 answers2024-04-19

Create a database.

Select the Program Management SQL Server 2008 SQL Server Management Studio command in the Start menu to open the SQL Server Management Studio window and establish a connection using Windows or SQL Server authentication. >>>More

10 answers2024-04-19

The database is generally composed of many tables, for example, the school builds a database, which can build a student table (including the student's name, age, student number, class, date of birth), a teacher table (including the teacher's name, age, teaching class, teaching category), a report sheet (including the student's student number, and the grades of each subject), etc. These are the ways in which the files are stored in the database, and try to make sure that the items in a table are closely related and have the same attributes, if this condition cannot be met, a table must be built (the redundancy of the built table has 4 levels). In order to meet the user's query needs, we also need to make a number of views, for example, you can make a view of his items have the name of the student, age, grades of each subject, and the teacher of each subject, etc., we can also export new items according to the existing items, for the purpose of simplicity, for example, the view can add an average grade, we add different permissions and roles to each view, and provide it to different people to query to protect the security of the database. >>>More

16 answers2024-04-19

I can only tell you one idea, first of all, see if your database table has an index or primary key, if so, select a number of fields by pressing the primary key or index, and compare them with the corresponding fields of the information you want to add. >>>More