SlideShare a Scribd company logo
1 of 53
Presented By Santosh Kumar
CONTENTS 
1 Indexing 
1.1 Problem 
1.2 What is Indexing 
1.3 Types 
1.4 Clustered Index 
1.5 Non-Clustered Index 
1.6 Unique Index 
1.7 When To Create Index And When Not 
2 Hashing 
2.1 Problem 
2.2 What is Hashing 
2.3 Algorithms Used In Hashing 
2.4 Hash Function 
3 Encryption 
3.1 What is Encryption 
3.2 Asymmetric Encryption 
3.3 Symmetric Encryption 
3.4 Which one is better. 
3.5 Why Use Encryption 
3.6 Transparent Data Encryption
Indexing
PROBLEM 
 Performance 
 Data Searching
WHAT IS INDEXING 
 An index can be created in a table to find data 
more quickly and efficiently. 
 great indexing can make your application nimble 
and fast.
TYPES 
 Clustered Index 
 Non-Clustered Index 
 Unique Index
CLUSTERED INDEX 
 It sorts and stores data rows in a table, based 
on key values. 
 Sytax to create Clustered Index: 
CREATE CLUSTERED INDEX Index_Name ON 
Schema.TableName(Column);
CLUSTERED INDEX 
 This is also called implicit index because It is 
automatically created by creating primary key. 
 Why Clustered Index can not created more than 
one column???
Clustered Index
NON-CLUSTERED INDEX 
 It contains a key value and a pointer to the data 
in the heap or clustered index. 
 Syntax to create non-clustered Index: 
CREATE INDEX Index_Name ON Schema.T 
ableName(Column); 
 Can it be created more than one column in a 
table???
UNIQUE INDEX 
 A unique index ensures that the index key 
contains no duplicate values. 
 The basic system to create : 
CREATE UNIQUE INDEX index_name on 
table_name (column_name); 
 Uniqueness can be a property of both 
clustered and nonclustered indexes.
WHEN TO CREATE INDEX AND 
WHEN NOT 
 Indexes should not be used on small tables. 
 Tables that have frequent, large batch update or 
insert operations. 
 Indexes should not be used on columns that 
contain a high number of NULL values. 
 Columns that are frequently manipulated should 
not be indexed.
Hashing
PROBLEM 
 Security 
 Data Stolen
WHAT IS HASHING 
 Hashing is used to hash some input. 
 In this we use hash function for hashing.
ALGORITHMS USED IN 
HASHING 
 MD2 
 MD4 
 MD5 
 SHA 
 SHA1 
 SHA2-256 
 SHA2-512
HASH FUNCTION 
 A hash function takes in data and returns back a 
fixed length block of bits such that any change to 
the data should result in a different block. 
HASHBYTES ( '<algorithm>', { @input | 'input' } ) 
<algorithm>::= MD2 | MD4 | MD5 | SHA | SHA1 | 
SHA2_256 | SHA2_512
HASH FUNCTION
Hashing is One Way
Example Of Hashing
Example Of Hashing
Example Of Hashing
Encryption
WHAT IS ECRYPTION 
 A process that converts original information , 
plain text to difficult to interpret. 
 Done by using encryption algorithm.
ASYMMETRIC ENCRYPTION
SYMMETRIC ENCRYPTION
WHICH ONE IS BETTER? 
Although, symmetric encryption is fast, it is not as 
safe as asymmetric encryption because someone 
could “steal” the key and decode the messages. But 
because of its speed, it's commonly used for e-commerce 
transactions. 
 Asymmetric encryption is more complex--and 
more secure. Asymmetric encryption's added 
safety comes at a price: More computation is 
required, so the process takes longer.
WHY USE ENCRYPTION? 
 Authentication 
 Privacy 
Protects personal data such as passwords. 
 Provides for confidentiality of private information. 
 Integrity 
 Ensures that a document or file has not been altered. 
 Accountability 
 Prevents denial or plagiarism.
TRANSPARENT DATA 
ENCRYPTION 
TDE is a new feature in SQL Server 2008; it 
provides real time encryption of data and log 
files. Data is encrypted before it is written to disk; 
data is decrypted when it is read from disk. The 
"transparent" aspect of TDE is that the encryption is 
performed by the database engine and SQL Server 
clients are completely unaware of it. There is 
absolutely no code that needs to be written to 
perform the encryption and decryption. There are a 
couple of steps to be performed to prepare the 
database for TDE, then the encryption is turned on 
at the database level via an ALTER DATBASE 
command.
TRANSPARENT DATA 
ENCRYPTION 
 Create a master key 
 Create or obtain a certificate protected by the 
master key 
 Create a database encryption key and protect it 
by the certificate 
 Set the database to use encryption
CREATE A MASTER KEY 
A master key is a symmetric key that is used to 
create certificates and asymmetric keys. Execute 
the following script to create a master key: 
USE master; 
CREATE MASTER KEY 
ENCRYPTION BY PASSWORD = 'Pass@word1'; 
GO
Create A Master Key
CREATE A CERTIFICATE 
Certificates can be used to create symmetric keys 
for data encryption or to encrypt the data 
directly. Execute the following script to create a 
certificate: 
USE master; 
CREATE CERTIFICATE TDECert 
WITH SUBJECT = 'TDE Certificate' 
GO
Create A Certificate
CREATE A DATABASE 
ENCRYPTION KEY 
A database encryption key is required for TDE. Execute 
the following script to create a new database and a 
database encryption key for it: 
CREATE DATABASE mssqltips_tde 
GO 
USE mssqltips_tde; 
CREATE DATABASE ENCRYPTION KEY 
WITH ALGORITHM = AES_256 
ENCRYPTION BY SERVER CERTIFICATE TDECert 
GO
ENABLE TDE 
The final step required to implement TDE is to 
execute the following script: 
ALTER DATABASE mssqltips_tde 
SET ENCRYPTION ON
First Example Of TDE 
 Create A Database
First Example Of TDE 
 Create A Table
First Example Of TDE 
 Backup This Database
First Example Of TDE 
 Open this backup with notepad++
First Example Of TDE
First Example Of TDE
First Example Of TDE
First Example Of TDE
First Example Of TDE
First Example Of TDE
Second Example Of TDE
Second Example Of TDE
Second Example Of TDE
Second Example Of TDE
Second Example Of TDE
Any Question???????
Thank you.!

More Related Content

What's hot

ASP.NET Session 11 12
ASP.NET Session 11 12ASP.NET Session 11 12
ASP.NET Session 11 12Sisir Ghosh
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingSolidQ
 
Data Access Technologies
Data Access TechnologiesData Access Technologies
Data Access TechnologiesDimara Hakim
 
Column Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL ServerColumn Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL ServerBehnam Mohammadi
 
Is2215 lecture7 lecturer_ado_intro
Is2215 lecture7 lecturer_ado_introIs2215 lecture7 lecturer_ado_intro
Is2215 lecture7 lecturer_ado_introdannygriff1
 
Query Store and live Query Statistics
Query Store and live Query StatisticsQuery Store and live Query Statistics
Query Store and live Query StatisticsSolidQ
 
Creating data with the test data builder pattern
Creating data with the test data builder patternCreating data with the test data builder pattern
Creating data with the test data builder patternAlan Parkinson
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerJerome J. Penna
 
Back-2-Basics: .NET Coding Standards For The Real World
Back-2-Basics: .NET Coding Standards For The Real WorldBack-2-Basics: .NET Coding Standards For The Real World
Back-2-Basics: .NET Coding Standards For The Real WorldDavid McCarter
 
Getting started with Elasticsearch in .net
Getting started with Elasticsearch in .netGetting started with Elasticsearch in .net
Getting started with Elasticsearch in .netIsmaeel Enjreny
 
Advanced Core Data
Advanced Core DataAdvanced Core Data
Advanced Core DataMake School
 
Flash And The City 2010
Flash And The City 2010Flash And The City 2010
Flash And The City 2010Steven Peeters
 
Geek Sync | Always Encrypted for Beginners
Geek Sync | Always Encrypted for BeginnersGeek Sync | Always Encrypted for Beginners
Geek Sync | Always Encrypted for BeginnersIDERA Software
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cNabeel Yoosuf
 
Intro to Core Data
Intro to Core DataIntro to Core Data
Intro to Core DataMake School
 
Entity Framework Database and Code First
Entity Framework Database and Code FirstEntity Framework Database and Code First
Entity Framework Database and Code FirstJames Johnson
 
Persistence on iOS
Persistence on iOSPersistence on iOS
Persistence on iOSMake School
 
Test Data Builder Pattern
Test Data Builder PatternTest Data Builder Pattern
Test Data Builder PatternAlan Parkinson
 
Secrets acrosscloudk8s
Secrets acrosscloudk8sSecrets acrosscloudk8s
Secrets acrosscloudk8sJhonnatan Gil
 

What's hot (20)

ASP.NET Session 11 12
ASP.NET Session 11 12ASP.NET Session 11 12
ASP.NET Session 11 12
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data Masking
 
Data Access Technologies
Data Access TechnologiesData Access Technologies
Data Access Technologies
 
Column Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL ServerColumn Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL Server
 
Is2215 lecture7 lecturer_ado_intro
Is2215 lecture7 lecturer_ado_introIs2215 lecture7 lecturer_ado_intro
Is2215 lecture7 lecturer_ado_intro
 
Query Store and live Query Statistics
Query Store and live Query StatisticsQuery Store and live Query Statistics
Query Store and live Query Statistics
 
Creating data with the test data builder pattern
Creating data with the test data builder patternCreating data with the test data builder pattern
Creating data with the test data builder pattern
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
Back-2-Basics: .NET Coding Standards For The Real World
Back-2-Basics: .NET Coding Standards For The Real WorldBack-2-Basics: .NET Coding Standards For The Real World
Back-2-Basics: .NET Coding Standards For The Real World
 
Getting started with Elasticsearch in .net
Getting started with Elasticsearch in .netGetting started with Elasticsearch in .net
Getting started with Elasticsearch in .net
 
Advanced Core Data
Advanced Core DataAdvanced Core Data
Advanced Core Data
 
Database
DatabaseDatabase
Database
 
Flash And The City 2010
Flash And The City 2010Flash And The City 2010
Flash And The City 2010
 
Geek Sync | Always Encrypted for Beginners
Geek Sync | Always Encrypted for BeginnersGeek Sync | Always Encrypted for Beginners
Geek Sync | Always Encrypted for Beginners
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12c
 
Intro to Core Data
Intro to Core DataIntro to Core Data
Intro to Core Data
 
Entity Framework Database and Code First
Entity Framework Database and Code FirstEntity Framework Database and Code First
Entity Framework Database and Code First
 
Persistence on iOS
Persistence on iOSPersistence on iOS
Persistence on iOS
 
Test Data Builder Pattern
Test Data Builder PatternTest Data Builder Pattern
Test Data Builder Pattern
 
Secrets acrosscloudk8s
Secrets acrosscloudk8sSecrets acrosscloudk8s
Secrets acrosscloudk8s
 

Viewers also liked

Writing an abstract presentation
Writing an abstract presentationWriting an abstract presentation
Writing an abstract presentationAndre Daniels
 
Abstract thinking for concrete solutions
Abstract thinking for concrete solutionsAbstract thinking for concrete solutions
Abstract thinking for concrete solutionsCREAX
 
Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Mary May Porto
 
Introduction to indexing
Introduction to indexingIntroduction to indexing
Introduction to indexingDaryl Superio
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentationlmartin8
 
How to Write a One-Page Abstract
How to Write a One-Page AbstractHow to Write a One-Page Abstract
How to Write a One-Page AbstractMindy McAdams
 
How to write an abstract
How to write an abstractHow to write an abstract
How to write an abstractdanix_cata
 
Introduction to Knowledge Management
Introduction to Knowledge ManagementIntroduction to Knowledge Management
Introduction to Knowledge ManagementMiera Idayu
 
Knowledge Management Presentation
Knowledge Management PresentationKnowledge Management Presentation
Knowledge Management Presentationkreaume
 
Knowledge management
Knowledge managementKnowledge management
Knowledge managementSehar Abbas
 

Viewers also liked (12)

Writing an abstract presentation
Writing an abstract presentationWriting an abstract presentation
Writing an abstract presentation
 
Abstract thinking for concrete solutions
Abstract thinking for concrete solutionsAbstract thinking for concrete solutions
Abstract thinking for concrete solutions
 
Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Introduction to indexing (presentation1)
Introduction to indexing (presentation1)
 
Introduction to indexing
Introduction to indexingIntroduction to indexing
Introduction to indexing
 
Types of indexes
Types of indexesTypes of indexes
Types of indexes
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentation
 
How to Write a One-Page Abstract
How to Write a One-Page AbstractHow to Write a One-Page Abstract
How to Write a One-Page Abstract
 
Indexing
IndexingIndexing
Indexing
 
How to write an abstract
How to write an abstractHow to write an abstract
How to write an abstract
 
Introduction to Knowledge Management
Introduction to Knowledge ManagementIntroduction to Knowledge Management
Introduction to Knowledge Management
 
Knowledge Management Presentation
Knowledge Management PresentationKnowledge Management Presentation
Knowledge Management Presentation
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
 

Similar to Presentation

Steve Jones - Encrypting Data
Steve Jones - Encrypting DataSteve Jones - Encrypting Data
Steve Jones - Encrypting DataRed Gate Software
 
Sql server column level encryption
Sql server column level encryptionSql server column level encryption
Sql server column level encryptionmuhammadhashir57
 
Transparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesTransparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesMichael Noel
 
Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016George Walters
 
My SQL Skills Killed the Server
My SQL Skills Killed the ServerMy SQL Skills Killed the Server
My SQL Skills Killed the ServerdevObjective
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Ashnikbiz
 
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...Michael Noel
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overviewukdpe
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...CloudTechnologies
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
 
Keysum - Using Checksum Keys
Keysum - Using Checksum KeysKeysum - Using Checksum Keys
Keysum - Using Checksum KeysDavid Walker
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
ASP.Net Presentation Part2
ASP.Net Presentation Part2ASP.Net Presentation Part2
ASP.Net Presentation Part2Neeraj Mathur
 
15 Ways to Kill Your Mysql Application Performance
15 Ways to Kill Your Mysql Application Performance15 Ways to Kill Your Mysql Application Performance
15 Ways to Kill Your Mysql Application Performanceguest9912e5
 
Scaling MySQL Strategies for Developers
Scaling MySQL Strategies for DevelopersScaling MySQL Strategies for Developers
Scaling MySQL Strategies for DevelopersJonathan Levin
 
SQL Server 2016 New Security Features
SQL Server 2016 New Security FeaturesSQL Server 2016 New Security Features
SQL Server 2016 New Security FeaturesGianluca Sartori
 

Similar to Presentation (20)

Steve Jones - Encrypting Data
Steve Jones - Encrypting DataSteve Jones - Encrypting Data
Steve Jones - Encrypting Data
 
Sql server column level encryption
Sql server column level encryptionSql server column level encryption
Sql server column level encryption
 
Transparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesTransparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content Databases
 
Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016
 
Farheen
Farheen Farheen
Farheen
 
AcceleTest
AcceleTestAcceleTest
AcceleTest
 
AcceleTest
AcceleTestAcceleTest
AcceleTest
 
My SQL Skills Killed the Server
My SQL Skills Killed the ServerMy SQL Skills Killed the Server
My SQL Skills Killed the Server
 
Sql killedserver
Sql killedserverSql killedserver
Sql killedserver
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
 
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Keysum - Using Checksum Keys
Keysum - Using Checksum KeysKeysum - Using Checksum Keys
Keysum - Using Checksum Keys
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
ASP.Net Presentation Part2
ASP.Net Presentation Part2ASP.Net Presentation Part2
ASP.Net Presentation Part2
 
15 Ways to Kill Your Mysql Application Performance
15 Ways to Kill Your Mysql Application Performance15 Ways to Kill Your Mysql Application Performance
15 Ways to Kill Your Mysql Application Performance
 
Scaling MySQL Strategies for Developers
Scaling MySQL Strategies for DevelopersScaling MySQL Strategies for Developers
Scaling MySQL Strategies for Developers
 
SQL Server 2016 New Security Features
SQL Server 2016 New Security FeaturesSQL Server 2016 New Security Features
SQL Server 2016 New Security Features
 

Recently uploaded

Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 

Recently uploaded (20)

Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 

Presentation

  • 2. CONTENTS 1 Indexing 1.1 Problem 1.2 What is Indexing 1.3 Types 1.4 Clustered Index 1.5 Non-Clustered Index 1.6 Unique Index 1.7 When To Create Index And When Not 2 Hashing 2.1 Problem 2.2 What is Hashing 2.3 Algorithms Used In Hashing 2.4 Hash Function 3 Encryption 3.1 What is Encryption 3.2 Asymmetric Encryption 3.3 Symmetric Encryption 3.4 Which one is better. 3.5 Why Use Encryption 3.6 Transparent Data Encryption
  • 4. PROBLEM  Performance  Data Searching
  • 5. WHAT IS INDEXING  An index can be created in a table to find data more quickly and efficiently.  great indexing can make your application nimble and fast.
  • 6. TYPES  Clustered Index  Non-Clustered Index  Unique Index
  • 7. CLUSTERED INDEX  It sorts and stores data rows in a table, based on key values.  Sytax to create Clustered Index: CREATE CLUSTERED INDEX Index_Name ON Schema.TableName(Column);
  • 8. CLUSTERED INDEX  This is also called implicit index because It is automatically created by creating primary key.  Why Clustered Index can not created more than one column???
  • 10. NON-CLUSTERED INDEX  It contains a key value and a pointer to the data in the heap or clustered index.  Syntax to create non-clustered Index: CREATE INDEX Index_Name ON Schema.T ableName(Column);  Can it be created more than one column in a table???
  • 11. UNIQUE INDEX  A unique index ensures that the index key contains no duplicate values.  The basic system to create : CREATE UNIQUE INDEX index_name on table_name (column_name);  Uniqueness can be a property of both clustered and nonclustered indexes.
  • 12. WHEN TO CREATE INDEX AND WHEN NOT  Indexes should not be used on small tables.  Tables that have frequent, large batch update or insert operations.  Indexes should not be used on columns that contain a high number of NULL values.  Columns that are frequently manipulated should not be indexed.
  • 14. PROBLEM  Security  Data Stolen
  • 15. WHAT IS HASHING  Hashing is used to hash some input.  In this we use hash function for hashing.
  • 16. ALGORITHMS USED IN HASHING  MD2  MD4  MD5  SHA  SHA1  SHA2-256  SHA2-512
  • 17. HASH FUNCTION  A hash function takes in data and returns back a fixed length block of bits such that any change to the data should result in a different block. HASHBYTES ( '<algorithm>', { @input | 'input' } ) <algorithm>::= MD2 | MD4 | MD5 | SHA | SHA1 | SHA2_256 | SHA2_512
  • 24. WHAT IS ECRYPTION  A process that converts original information , plain text to difficult to interpret.  Done by using encryption algorithm.
  • 27. WHICH ONE IS BETTER? Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for e-commerce transactions.  Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.
  • 28. WHY USE ENCRYPTION?  Authentication  Privacy Protects personal data such as passwords.  Provides for confidentiality of private information.  Integrity  Ensures that a document or file has not been altered.  Accountability  Prevents denial or plagiarism.
  • 29. TRANSPARENT DATA ENCRYPTION TDE is a new feature in SQL Server 2008; it provides real time encryption of data and log files. Data is encrypted before it is written to disk; data is decrypted when it is read from disk. The "transparent" aspect of TDE is that the encryption is performed by the database engine and SQL Server clients are completely unaware of it. There is absolutely no code that needs to be written to perform the encryption and decryption. There are a couple of steps to be performed to prepare the database for TDE, then the encryption is turned on at the database level via an ALTER DATBASE command.
  • 30. TRANSPARENT DATA ENCRYPTION  Create a master key  Create or obtain a certificate protected by the master key  Create a database encryption key and protect it by the certificate  Set the database to use encryption
  • 31. CREATE A MASTER KEY A master key is a symmetric key that is used to create certificates and asymmetric keys. Execute the following script to create a master key: USE master; CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'Pass@word1'; GO
  • 33. CREATE A CERTIFICATE Certificates can be used to create symmetric keys for data encryption or to encrypt the data directly. Execute the following script to create a certificate: USE master; CREATE CERTIFICATE TDECert WITH SUBJECT = 'TDE Certificate' GO
  • 35. CREATE A DATABASE ENCRYPTION KEY A database encryption key is required for TDE. Execute the following script to create a new database and a database encryption key for it: CREATE DATABASE mssqltips_tde GO USE mssqltips_tde; CREATE DATABASE ENCRYPTION KEY WITH ALGORITHM = AES_256 ENCRYPTION BY SERVER CERTIFICATE TDECert GO
  • 36. ENABLE TDE The final step required to implement TDE is to execute the following script: ALTER DATABASE mssqltips_tde SET ENCRYPTION ON
  • 37. First Example Of TDE  Create A Database
  • 38. First Example Of TDE  Create A Table
  • 39. First Example Of TDE  Backup This Database
  • 40. First Example Of TDE  Open this backup with notepad++