Oracle Database B10772-01 Uživatelský manuál Strana 49

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 518
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 48
Solving Security Challenges with Oracle Advanced Security
Introduction to Oracle Advanced Security 1-5
Data Encryption
Sensitive information that travels over enterprise networks and the Internet can be
protected by encryption algorithms. An encryption algorithm transforms
information into a form that can be deciphered with a decryption key.
Figure 1–1 shows how encryption works to ensure the security of a transaction. For
example, if a manager approves a bonus, this data should be encrypted when sent
over the network to avoid eavesdropping. If all communication between the client,
the database, and the application server is encrypted, then when the manager sends
the bonus amount to the database, it is protected.
Figure 1–1 Encryption
This section discusses the following topics:
Supported Encryption Algorithms
Data Integrity
Federal Information Processing Standard
Supported Encryption Algorithms
Oracle Advanced Security provides the following encryption algorithms to protect
the privacy of network data transmissions:
RC4 Encryption
DES Encryption
Triple-DES Encryption
Advanced Encryption Standard
Oracle
Client
Oracle
Database
Oracle
Application
Server
Internet
Encrypted Data
Packet
#yu1(*^tp4e %oiu*{hjktyot https://
Encrypted Data
Packet
Zobrazit stránku 48
1 2 ... 44 45 46 47 48 49 50 51 52 53 54 ... 517 518

Komentáře k této Příručce

Žádné komentáře