The Purpose and Methods of the Encryption Technique as Database Security
FAZZDEVELOPER.COM - Do you ever know about the Encryption technique as database security? Encryption is the process of securing information by making it unreadable without the help of special knowledge. or it can be defined as encryption, which is the process of converting plaintext into ciphertext. The text itself is the original data or message to be sent, while Ciphertext is the result of encryption. Another definition of encryption is the process of scrambling data so that it cannot be read by other parties. see the full explanation!
The purpose of data encryption
The purpose of encryption is as follows:
• Confidentiality: That is to protect the content of information from anyone except those who have the authority or secret key to open encrypted information.
• Data integrity: To maintain the authenticity/integrity of data, the system must have the ability to detect data manipulation by unauthorized parties, including inserting, deleting, and substituting other data into the actual data.
• Authentication: This deals with identification/recognition, both as a whole system and the information itself. Two communicating parties must introduce themselves to each other. Information sent through the channel must be authenticated, the contents of the data, the time of delivery, and others.
• Non-repudiation / non-denial: This is an attempt to prevent denial of the delivery/creation of information by the sender. The way this algorithm works is to replace each character from the plaintext with another character.
How to use encryption techniques to protect data?
Encryption is divided into several methods allowing users to choose a specific method according to their needs as follows:
• File Encryption
This feature of the Encryption technique as database security the files one by one according to user needs if you want to protect only certain files that are considered important or confidential. This method is usually used to secure files to be transferred via email, CD / DVD, memory cards, and the like.
• Folder Encryption
Serves to encrypt folders including subfolders. Any new files or folders created in the folder are encrypted as well. If you drag and drop a file or folder into an encrypted folder, it will automatically be encrypted, but if you drag and drop the file or folder out, it will be decrypted immediately. Features like this can hide all encrypted folders when not logged in so they are not visible.
• Full Disk Encryption
This method will encrypt everything inside the computer hard drive and that is including the system, programs, and all data stored on the drive. After the hard drive’s initial encryption process has been completed, the user needs to log in when the computer first starts up, this is known as pre-boot authentication, using a password. After logging in, the computer will operate as usual with all available data and programs. However, it would require a login password to access the computer.
• Shredder
Did you know that deleting data/files by pressing the delete button does not guarantee that the data is completely deleted / lost? Data that has been deleted can still be recalled/recalled using certain software. A shredder is a feature that is capable of destroying data so that it cannot be used by anyone. Shredder is not a feature to encrypt, but this data destruction feature is usually an integral part of an encryption application.
Those are some explanations about the Encryption technique as database security.

