Browse Definitions :
Definition

engine-level encryption

Contributor(s): Won Gil Kim

Engine-level encryption is cryptographic encoding and decoding of data that is executed within a database engine.

Encryption can be executed at many locations, including appplication servers, database management system (DBMS) servers and appliances. In a DBMS like Oracle, MS-SQL or MySQL, database operations are conducted in an operation engine. Such DBMS also have a storage engine. Engine-level encryption occurs in an encryption engine inserted between the operation engine and the storage engine.

Database encryption is categorized in a number of ways in addition to the location of its execution. It can be categorized according to the unit of encryption as well, for example as table-level or column-level encryption. Engine-level encryption may be used to encrypt any unit of encryption. Column-level encryption in an engine-level database encryption product indicates that the data is encrypted on the level of columns, rather than tables, rows or some other unit.

Engine-level encryption software products include Oracle TDE, MS-SQL TDE and MyDiamo.

 

This was last updated in May 2013

Continue Reading About engine-level encryption

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close