Transparent data encryption, the Glossary
Transparent Data Encryption (often abbreviated to TDE) is a technology employed by Microsoft, IBM and Oracle to encrypt database files.[1]
Table of Contents
21 relations: Advanced Encryption Standard, Backup, California, California Senate Bill 1386 (2002), Data at rest, Data compression, Data in transit, Data in use, Data Protection API, Database, Disk encryption, Encryption, Hardware security module, IBM, IBM Db2, Microsoft, Microsoft SQL Server, Oracle Advanced Security, Oracle Corporation, Payment Card Industry Data Security Standard, Triple DES.
- Disk encryption
Advanced Encryption Standard
The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
See Transparent data encryption and Advanced Encryption Standard
Backup
In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
See Transparent data encryption and Backup
California
California is a state in the Western United States, lying on the American Pacific Coast.
See Transparent data encryption and California
California Senate Bill 1386 (2002)
California S.B. 1386 was a bill passed by the California legislature that amended the California law regulating the privacy of personal information: civil codes 1798.29, 1798.82 and 1798.84.
See Transparent data encryption and California Senate Bill 1386 (2002)
Data at rest
Data at rest in information technology means data that is housed physically on computer data storage in any digital form (e.g. cloud storage, file hosting services, databases, data warehouses, spreadsheets, archives, tapes, off-site or cloud backups, mobile devices etc.). Data at rest includes both structured and unstructured data.
See Transparent data encryption and Data at rest
Data compression
In information theory, data compression, source coding, or bit-rate reduction is the process of encoding information using fewer bits than the original representation.
See Transparent data encryption and Data compression
Data in transit
Data in transit, also referred to as data in motion and data in flight, is data en route between source and destination, typically on a computer network.
See Transparent data encryption and Data in transit
Data in use
Data in use is an information technology term referring to active data which is stored in a non-persistent digital state typically in computer random-access memory (RAM), CPU caches, or CPU registers.
See Transparent data encryption and Data in use
Data Protection API
Data Protection Application Programming Interface (DPAPI) is a simple cryptographic application programming interface available as a built-in component in Windows 2000 and later versions of Microsoft Windows operating systems.
See Transparent data encryption and Data Protection API
Database
In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and analyze the data.
See Transparent data encryption and Database
Disk encryption
Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes.
See Transparent data encryption and Disk encryption
Encryption
In cryptography, encryption is the process of transforming (more specifically, encoding) information in a way that, ideally, only authorized parties can decode.
See Transparent data encryption and Encryption
Hardware security module
A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions.
See Transparent data encryption and Hardware security module
IBM
International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American multinational technology company headquartered in Armonk, New York and present in over 175 countries.
See Transparent data encryption and IBM
IBM Db2
Db2 is a family of data management products, including database servers, developed by IBM.
See Transparent data encryption and IBM Db2
Microsoft
Microsoft Corporation is an American multinational corporation and technology company headquartered in Redmond, Washington.
See Transparent data encryption and Microsoft
Microsoft SQL Server
Microsoft SQL Server (Structured Query Language) is a proprietary relational database management system developed by Microsoft.
See Transparent data encryption and Microsoft SQL Server
Oracle Advanced Security
Oracle Advanced Security, an extra-cost option for Oracle database environments, extends Oracle Net Services in the field of database computing to provide network security, enterprise-user security, public-key infrastructure security and data encryption to users of Oracle databases.
See Transparent data encryption and Oracle Advanced Security
Oracle Corporation
Oracle Corporation is an American multinational computer technology company headquartered in Austin, Texas.
See Transparent data encryption and Oracle Corporation
Payment Card Industry Data Security Standard
The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands.
See Transparent data encryption and Payment Card Industry Data Security Standard
Triple DES
In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.
See Transparent data encryption and Triple DES
See also
Disk encryption
- BestCrypt
- BitLocker
- Cold boot attack
- Comparison of disk encryption software
- Comparison of encrypted external drives
- Disk encryption
- Disk encryption software
- Disk encryption theory
- Dm-crypt
- E4M
- ECryptfs
- EncFS
- FileVault
- Filesystem-level encryption
- FreeOTFE
- GBDE
- GNU fcrypt
- Geli (software)
- Hardware-based full disk encryption
- IEEE P1619
- In re Boucher
- Key Management Interoperability Protocol
- Linux Unified Key Setup
- List of cryptographic file systems
- Next-Generation Secure Computing Base
- PGPDisk
- Private Disk
- Rclone
- Scramdisk
- Sentry 2020
- TRESOR
- Transparent data encryption
- TrueCrypt
- TrueCrypt version history
- USB flash drive security
- United States v. Fricosu
- VeraCrypt
- Watermarking attack
References
[1] https://en.wikipedia.org/wiki/Transparent_data_encryption