SlideShare a Scribd company logo
Presented By Santosh Kumar
CONTENTS 
1 Indexing 
1.1 Problem 
1.2 What is Indexing 
1.3 Types 
1.4 Clustered Index 
1.5 Non-Clustered Index 
1.6 Unique Index 
1.7 When To Create Index And When Not 
2 Hashing 
2.1 Problem 
2.2 What is Hashing 
2.3 Algorithms Used In Hashing 
2.4 Hash Function 
3 Encryption 
3.1 What is Encryption 
3.2 Asymmetric Encryption 
3.3 Symmetric Encryption 
3.4 Which one is better. 
3.5 Why Use Encryption 
3.6 Transparent Data Encryption
Indexing
PROBLEM 
 Performance 
 Data Searching
WHAT IS INDEXING 
 An index can be created in a table to find data 
more quickly and efficiently. 
 great indexing can make your application nimble 
and fast.
TYPES 
 Clustered Index 
 Non-Clustered Index 
 Unique Index
CLUSTERED INDEX 
 It sorts and stores data rows in a table, based 
on key values. 
 Sytax to create Clustered Index: 
CREATE CLUSTERED INDEX Index_Name ON 
Schema.TableName(Column);
CLUSTERED INDEX 
 This is also called implicit index because It is 
automatically created by creating primary key. 
 Why Clustered Index can not created more than 
one column???
Clustered Index
NON-CLUSTERED INDEX 
 It contains a key value and a pointer to the data 
in the heap or clustered index. 
 Syntax to create non-clustered Index: 
CREATE INDEX Index_Name ON Schema.T 
ableName(Column); 
 Can it be created more than one column in a 
table???
UNIQUE INDEX 
 A unique index ensures that the index key 
contains no duplicate values. 
 The basic system to create : 
CREATE UNIQUE INDEX index_name on 
table_name (column_name); 
 Uniqueness can be a property of both 
clustered and nonclustered indexes.
WHEN TO CREATE INDEX AND 
WHEN NOT 
 Indexes should not be used on small tables. 
 Tables that have frequent, large batch update or 
insert operations. 
 Indexes should not be used on columns that 
contain a high number of NULL values. 
 Columns that are frequently manipulated should 
not be indexed.
Hashing
PROBLEM 
 Security 
 Data Stolen
WHAT IS HASHING 
 Hashing is used to hash some input. 
 In this we use hash function for hashing.
ALGORITHMS USED IN 
HASHING 
 MD2 
 MD4 
 MD5 
 SHA 
 SHA1 
 SHA2-256 
 SHA2-512
HASH FUNCTION 
 A hash function takes in data and returns back a 
fixed length block of bits such that any change to 
the data should result in a different block. 
HASHBYTES ( '<algorithm>', { @input | 'input' } ) 
<algorithm>::= MD2 | MD4 | MD5 | SHA | SHA1 | 
SHA2_256 | SHA2_512
HASH FUNCTION
Hashing is One Way
Example Of Hashing
Example Of Hashing
Example Of Hashing
Encryption
WHAT IS ECRYPTION 
 A process that converts original information , 
plain text to difficult to interpret. 
 Done by using encryption algorithm.
ASYMMETRIC ENCRYPTION
SYMMETRIC ENCRYPTION
WHICH ONE IS BETTER? 
Although, symmetric encryption is fast, it is not as 
safe as asymmetric encryption because someone 
could “steal” the key and decode the messages. But 
because of its speed, it's commonly used for e-commerce 
transactions. 
 Asymmetric encryption is more complex--and 
more secure. Asymmetric encryption's added 
safety comes at a price: More computation is 
required, so the process takes longer.
WHY USE ENCRYPTION? 
 Authentication 
 Privacy 
Protects personal data such as passwords. 
 Provides for confidentiality of private information. 
 Integrity 
 Ensures that a document or file has not been altered. 
 Accountability 
 Prevents denial or plagiarism.
TRANSPARENT DATA 
ENCRYPTION 
TDE is a new feature in SQL Server 2008; it 
provides real time encryption of data and log 
files. Data is encrypted before it is written to disk; 
data is decrypted when it is read from disk. The 
"transparent" aspect of TDE is that the encryption is 
performed by the database engine and SQL Server 
clients are completely unaware of it. There is 
absolutely no code that needs to be written to 
perform the encryption and decryption. There are a 
couple of steps to be performed to prepare the 
database for TDE, then the encryption is turned on 
at the database level via an ALTER DATBASE 
command.
TRANSPARENT DATA 
ENCRYPTION 
 Create a master key 
 Create or obtain a certificate protected by the 
master key 
 Create a database encryption key and protect it 
by the certificate 
 Set the database to use encryption
CREATE A MASTER KEY 
A master key is a symmetric key that is used to 
create certificates and asymmetric keys. Execute 
the following script to create a master key: 
USE master; 
CREATE MASTER KEY 
ENCRYPTION BY PASSWORD = 'Pass@word1'; 
GO
Create A Master Key
CREATE A CERTIFICATE 
Certificates can be used to create symmetric keys 
for data encryption or to encrypt the data 
directly. Execute the following script to create a 
certificate: 
USE master; 
CREATE CERTIFICATE TDECert 
WITH SUBJECT = 'TDE Certificate' 
GO
Create A Certificate
CREATE A DATABASE 
ENCRYPTION KEY 
A database encryption key is required for TDE. Execute 
the following script to create a new database and a 
database encryption key for it: 
CREATE DATABASE mssqltips_tde 
GO 
USE mssqltips_tde; 
CREATE DATABASE ENCRYPTION KEY 
WITH ALGORITHM = AES_256 
ENCRYPTION BY SERVER CERTIFICATE TDECert 
GO
ENABLE TDE 
The final step required to implement TDE is to 
execute the following script: 
ALTER DATABASE mssqltips_tde 
SET ENCRYPTION ON
First Example Of TDE 
 Create A Database
First Example Of TDE 
 Create A Table
First Example Of TDE 
 Backup This Database
First Example Of TDE 
 Open this backup with notepad++
First Example Of TDE
First Example Of TDE
First Example Of TDE
First Example Of TDE
First Example Of TDE
First Example Of TDE
Second Example Of TDE
Second Example Of TDE
Second Example Of TDE
Second Example Of TDE
Second Example Of TDE
Any Question???????
Thank you.!

More Related Content

What's hot

ASP.NET Session 11 12
ASP.NET Session 11 12ASP.NET Session 11 12
ASP.NET Session 11 12
Sisir Ghosh
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data Masking
SolidQ
 
Data Access Technologies
Data Access TechnologiesData Access Technologies
Data Access Technologies
Dimara Hakim
 
Column Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL ServerColumn Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL Server
Behnam Mohammadi
 
Is2215 lecture7 lecturer_ado_intro
Is2215 lecture7 lecturer_ado_introIs2215 lecture7 lecturer_ado_intro
Is2215 lecture7 lecturer_ado_intro
dannygriff1
 
Query Store and live Query Statistics
Query Store and live Query StatisticsQuery Store and live Query Statistics
Query Store and live Query Statistics
SolidQ
 
Creating data with the test data builder pattern
Creating data with the test data builder patternCreating data with the test data builder pattern
Creating data with the test data builder pattern
Alan Parkinson
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
Jerome J. Penna
 
Back-2-Basics: .NET Coding Standards For The Real World
Back-2-Basics: .NET Coding Standards For The Real WorldBack-2-Basics: .NET Coding Standards For The Real World
Back-2-Basics: .NET Coding Standards For The Real World
David McCarter
 
Getting started with Elasticsearch in .net
Getting started with Elasticsearch in .netGetting started with Elasticsearch in .net
Getting started with Elasticsearch in .net
Ismaeel Enjreny
 
Advanced Core Data
Advanced Core DataAdvanced Core Data
Advanced Core Data
Make School
 
Database
DatabaseDatabase
Flash And The City 2010
Flash And The City 2010Flash And The City 2010
Flash And The City 2010
Steven Peeters
 
Geek Sync | Always Encrypted for Beginners
Geek Sync | Always Encrypted for BeginnersGeek Sync | Always Encrypted for Beginners
Geek Sync | Always Encrypted for Beginners
IDERA Software
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12c
Nabeel Yoosuf
 
Intro to Core Data
Intro to Core DataIntro to Core Data
Intro to Core Data
Make School
 
Entity Framework Database and Code First
Entity Framework Database and Code FirstEntity Framework Database and Code First
Entity Framework Database and Code First
James Johnson
 
Persistence on iOS
Persistence on iOSPersistence on iOS
Persistence on iOS
Make School
 
Test Data Builder Pattern
Test Data Builder PatternTest Data Builder Pattern
Test Data Builder Pattern
Alan Parkinson
 
Secrets acrosscloudk8s
Secrets acrosscloudk8sSecrets acrosscloudk8s
Secrets acrosscloudk8s
Jhonnatan Gil
 

What's hot (20)

ASP.NET Session 11 12
ASP.NET Session 11 12ASP.NET Session 11 12
ASP.NET Session 11 12
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data Masking
 
Data Access Technologies
Data Access TechnologiesData Access Technologies
Data Access Technologies
 
Column Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL ServerColumn Level Encryption in Microsoft SQL Server
Column Level Encryption in Microsoft SQL Server
 
Is2215 lecture7 lecturer_ado_intro
Is2215 lecture7 lecturer_ado_introIs2215 lecture7 lecturer_ado_intro
Is2215 lecture7 lecturer_ado_intro
 
Query Store and live Query Statistics
Query Store and live Query StatisticsQuery Store and live Query Statistics
Query Store and live Query Statistics
 
Creating data with the test data builder pattern
Creating data with the test data builder patternCreating data with the test data builder pattern
Creating data with the test data builder pattern
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
Back-2-Basics: .NET Coding Standards For The Real World
Back-2-Basics: .NET Coding Standards For The Real WorldBack-2-Basics: .NET Coding Standards For The Real World
Back-2-Basics: .NET Coding Standards For The Real World
 
Getting started with Elasticsearch in .net
Getting started with Elasticsearch in .netGetting started with Elasticsearch in .net
Getting started with Elasticsearch in .net
 
Advanced Core Data
Advanced Core DataAdvanced Core Data
Advanced Core Data
 
Database
DatabaseDatabase
Database
 
Flash And The City 2010
Flash And The City 2010Flash And The City 2010
Flash And The City 2010
 
Geek Sync | Always Encrypted for Beginners
Geek Sync | Always Encrypted for BeginnersGeek Sync | Always Encrypted for Beginners
Geek Sync | Always Encrypted for Beginners
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12c
 
Intro to Core Data
Intro to Core DataIntro to Core Data
Intro to Core Data
 
Entity Framework Database and Code First
Entity Framework Database and Code FirstEntity Framework Database and Code First
Entity Framework Database and Code First
 
Persistence on iOS
Persistence on iOSPersistence on iOS
Persistence on iOS
 
Test Data Builder Pattern
Test Data Builder PatternTest Data Builder Pattern
Test Data Builder Pattern
 
Secrets acrosscloudk8s
Secrets acrosscloudk8sSecrets acrosscloudk8s
Secrets acrosscloudk8s
 

Viewers also liked

Writing an abstract presentation
Writing an abstract presentationWriting an abstract presentation
Writing an abstract presentation
Andre Daniels
 
Abstract thinking for concrete solutions
Abstract thinking for concrete solutionsAbstract thinking for concrete solutions
Abstract thinking for concrete solutions
CREAX
 
Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Introduction to indexing (presentation1)
Introduction to indexing (presentation1)
Mary May Porto
 
Introduction to indexing
Introduction to indexingIntroduction to indexing
Introduction to indexing
Daryl Superio
 
Types of indexes
Types of indexesTypes of indexes
Types of indexes
Ernani Agulto
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentation
lmartin8
 
How to Write a One-Page Abstract
How to Write a One-Page AbstractHow to Write a One-Page Abstract
How to Write a One-Page Abstract
Mindy McAdams
 
Indexing
IndexingIndexing
Indexing
Ime Amor Mortel
 
How to write an abstract
How to write an abstractHow to write an abstract
How to write an abstract
danix_cata
 
Introduction to Knowledge Management
Introduction to Knowledge ManagementIntroduction to Knowledge Management
Introduction to Knowledge Management
Miera Idayu
 
Knowledge Management Presentation
Knowledge Management PresentationKnowledge Management Presentation
Knowledge Management Presentation
kreaume
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
Sehar Abbas
 

Viewers also liked (12)

Writing an abstract presentation
Writing an abstract presentationWriting an abstract presentation
Writing an abstract presentation
 
Abstract thinking for concrete solutions
Abstract thinking for concrete solutionsAbstract thinking for concrete solutions
Abstract thinking for concrete solutions
 
Introduction to indexing (presentation1)
Introduction to indexing (presentation1)Introduction to indexing (presentation1)
Introduction to indexing (presentation1)
 
Introduction to indexing
Introduction to indexingIntroduction to indexing
Introduction to indexing
 
Types of indexes
Types of indexesTypes of indexes
Types of indexes
 
5013 Indexing Presentation
5013 Indexing Presentation5013 Indexing Presentation
5013 Indexing Presentation
 
How to Write a One-Page Abstract
How to Write a One-Page AbstractHow to Write a One-Page Abstract
How to Write a One-Page Abstract
 
Indexing
IndexingIndexing
Indexing
 
How to write an abstract
How to write an abstractHow to write an abstract
How to write an abstract
 
Introduction to Knowledge Management
Introduction to Knowledge ManagementIntroduction to Knowledge Management
Introduction to Knowledge Management
 
Knowledge Management Presentation
Knowledge Management PresentationKnowledge Management Presentation
Knowledge Management Presentation
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
 

Similar to Presentation

Steve Jones - Encrypting Data
Steve Jones - Encrypting DataSteve Jones - Encrypting Data
Steve Jones - Encrypting Data
Red Gate Software
 
Sql server column level encryption
Sql server column level encryptionSql server column level encryption
Sql server column level encryption
muhammadhashir57
 
Transparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesTransparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content Databases
Michael Noel
 
Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016
George Walters
 
Farheen
Farheen Farheen
Farheen
Farheen Naaz
 
AcceleTest
AcceleTestAcceleTest
AcceleTest
Liz Martin
 
AcceleTest
AcceleTestAcceleTest
AcceleTest
Liz Martin
 
My SQL Skills Killed the Server
My SQL Skills Killed the ServerMy SQL Skills Killed the Server
My SQL Skills Killed the Server
devObjective
 
Sql killedserver
Sql killedserverSql killedserver
Sql killedserver
ColdFusionConference
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
Ashnikbiz
 
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
Michael Noel
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
ukdpe
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
CloudTechnologies
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Pvrtechnologies Nellore
 
Keysum - Using Checksum Keys
Keysum - Using Checksum KeysKeysum - Using Checksum Keys
Keysum - Using Checksum Keys
David Walker
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
ASP.Net Presentation Part2
ASP.Net Presentation Part2ASP.Net Presentation Part2
ASP.Net Presentation Part2
Neeraj Mathur
 
15 Ways to Kill Your Mysql Application Performance
15 Ways to Kill Your Mysql Application Performance15 Ways to Kill Your Mysql Application Performance
15 Ways to Kill Your Mysql Application Performance
guest9912e5
 
Scaling MySQL Strategies for Developers
Scaling MySQL Strategies for DevelopersScaling MySQL Strategies for Developers
Scaling MySQL Strategies for Developers
Jonathan Levin
 
SQL Server 2016 New Security Features
SQL Server 2016 New Security FeaturesSQL Server 2016 New Security Features
SQL Server 2016 New Security Features
Gianluca Sartori
 

Similar to Presentation (20)

Steve Jones - Encrypting Data
Steve Jones - Encrypting DataSteve Jones - Encrypting Data
Steve Jones - Encrypting Data
 
Sql server column level encryption
Sql server column level encryptionSql server column level encryption
Sql server column level encryption
 
Transparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesTransparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content Databases
 
Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016
 
Farheen
Farheen Farheen
Farheen
 
AcceleTest
AcceleTestAcceleTest
AcceleTest
 
AcceleTest
AcceleTestAcceleTest
AcceleTest
 
My SQL Skills Killed the Server
My SQL Skills Killed the ServerMy SQL Skills Killed the Server
My SQL Skills Killed the Server
 
Sql killedserver
Sql killedserverSql killedserver
Sql killedserver
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
 
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Key aggregate searchable encryption (kase) for group data sharing via cloud s...
Key aggregate searchable encryption (kase) for group data sharing via cloud s...
 
Keysum - Using Checksum Keys
Keysum - Using Checksum KeysKeysum - Using Checksum Keys
Keysum - Using Checksum Keys
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
ASP.Net Presentation Part2
ASP.Net Presentation Part2ASP.Net Presentation Part2
ASP.Net Presentation Part2
 
15 Ways to Kill Your Mysql Application Performance
15 Ways to Kill Your Mysql Application Performance15 Ways to Kill Your Mysql Application Performance
15 Ways to Kill Your Mysql Application Performance
 
Scaling MySQL Strategies for Developers
Scaling MySQL Strategies for DevelopersScaling MySQL Strategies for Developers
Scaling MySQL Strategies for Developers
 
SQL Server 2016 New Security Features
SQL Server 2016 New Security FeaturesSQL Server 2016 New Security Features
SQL Server 2016 New Security Features
 

Recently uploaded

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 

Recently uploaded (20)

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 

Presentation

  • 2. CONTENTS 1 Indexing 1.1 Problem 1.2 What is Indexing 1.3 Types 1.4 Clustered Index 1.5 Non-Clustered Index 1.6 Unique Index 1.7 When To Create Index And When Not 2 Hashing 2.1 Problem 2.2 What is Hashing 2.3 Algorithms Used In Hashing 2.4 Hash Function 3 Encryption 3.1 What is Encryption 3.2 Asymmetric Encryption 3.3 Symmetric Encryption 3.4 Which one is better. 3.5 Why Use Encryption 3.6 Transparent Data Encryption
  • 4. PROBLEM  Performance  Data Searching
  • 5. WHAT IS INDEXING  An index can be created in a table to find data more quickly and efficiently.  great indexing can make your application nimble and fast.
  • 6. TYPES  Clustered Index  Non-Clustered Index  Unique Index
  • 7. CLUSTERED INDEX  It sorts and stores data rows in a table, based on key values.  Sytax to create Clustered Index: CREATE CLUSTERED INDEX Index_Name ON Schema.TableName(Column);
  • 8. CLUSTERED INDEX  This is also called implicit index because It is automatically created by creating primary key.  Why Clustered Index can not created more than one column???
  • 10. NON-CLUSTERED INDEX  It contains a key value and a pointer to the data in the heap or clustered index.  Syntax to create non-clustered Index: CREATE INDEX Index_Name ON Schema.T ableName(Column);  Can it be created more than one column in a table???
  • 11. UNIQUE INDEX  A unique index ensures that the index key contains no duplicate values.  The basic system to create : CREATE UNIQUE INDEX index_name on table_name (column_name);  Uniqueness can be a property of both clustered and nonclustered indexes.
  • 12. WHEN TO CREATE INDEX AND WHEN NOT  Indexes should not be used on small tables.  Tables that have frequent, large batch update or insert operations.  Indexes should not be used on columns that contain a high number of NULL values.  Columns that are frequently manipulated should not be indexed.
  • 14. PROBLEM  Security  Data Stolen
  • 15. WHAT IS HASHING  Hashing is used to hash some input.  In this we use hash function for hashing.
  • 16. ALGORITHMS USED IN HASHING  MD2  MD4  MD5  SHA  SHA1  SHA2-256  SHA2-512
  • 17. HASH FUNCTION  A hash function takes in data and returns back a fixed length block of bits such that any change to the data should result in a different block. HASHBYTES ( '<algorithm>', { @input | 'input' } ) <algorithm>::= MD2 | MD4 | MD5 | SHA | SHA1 | SHA2_256 | SHA2_512
  • 24. WHAT IS ECRYPTION  A process that converts original information , plain text to difficult to interpret.  Done by using encryption algorithm.
  • 27. WHICH ONE IS BETTER? Although, symmetric encryption is fast, it is not as safe as asymmetric encryption because someone could “steal” the key and decode the messages. But because of its speed, it's commonly used for e-commerce transactions.  Asymmetric encryption is more complex--and more secure. Asymmetric encryption's added safety comes at a price: More computation is required, so the process takes longer.
  • 28. WHY USE ENCRYPTION?  Authentication  Privacy Protects personal data such as passwords.  Provides for confidentiality of private information.  Integrity  Ensures that a document or file has not been altered.  Accountability  Prevents denial or plagiarism.
  • 29. TRANSPARENT DATA ENCRYPTION TDE is a new feature in SQL Server 2008; it provides real time encryption of data and log files. Data is encrypted before it is written to disk; data is decrypted when it is read from disk. The "transparent" aspect of TDE is that the encryption is performed by the database engine and SQL Server clients are completely unaware of it. There is absolutely no code that needs to be written to perform the encryption and decryption. There are a couple of steps to be performed to prepare the database for TDE, then the encryption is turned on at the database level via an ALTER DATBASE command.
  • 30. TRANSPARENT DATA ENCRYPTION  Create a master key  Create or obtain a certificate protected by the master key  Create a database encryption key and protect it by the certificate  Set the database to use encryption
  • 31. CREATE A MASTER KEY A master key is a symmetric key that is used to create certificates and asymmetric keys. Execute the following script to create a master key: USE master; CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'Pass@word1'; GO
  • 33. CREATE A CERTIFICATE Certificates can be used to create symmetric keys for data encryption or to encrypt the data directly. Execute the following script to create a certificate: USE master; CREATE CERTIFICATE TDECert WITH SUBJECT = 'TDE Certificate' GO
  • 35. CREATE A DATABASE ENCRYPTION KEY A database encryption key is required for TDE. Execute the following script to create a new database and a database encryption key for it: CREATE DATABASE mssqltips_tde GO USE mssqltips_tde; CREATE DATABASE ENCRYPTION KEY WITH ALGORITHM = AES_256 ENCRYPTION BY SERVER CERTIFICATE TDECert GO
  • 36. ENABLE TDE The final step required to implement TDE is to execute the following script: ALTER DATABASE mssqltips_tde SET ENCRYPTION ON
  • 37. First Example Of TDE  Create A Database
  • 38. First Example Of TDE  Create A Table
  • 39. First Example Of TDE  Backup This Database
  • 40. First Example Of TDE  Open this backup with notepad++