Data Security means protecting a database from destructive forces and the unwanted actions of unauthorized user. Data security also protects data from corruption. Data security is the main priority for organizations of every size and genre.
Questions tagged [data-security]
99 questions
0
votes
0 answers
SQL Data Security for SSRS Reporting when user security is in a table
I have a single database for multiple clients. There are tables that contain the UserName and SecurityAccess for each client's UI users. These 'users' are not users with logins in the actual database.
Select u.userName, r.roleCode,…

MelindaC
- 1
- 1
0
votes
1 answer
Data security mechanism in pouch db
I want to know the how we can secure data in pouch db ? Is there any mechanism like encryption for data-at-rest or SSL protection for transport layer ?

Heta Desai
- 57
- 1
- 11
0
votes
1 answer
Segmentation Fault when editing code of executable file
Working on a Cyber Security Project:
When editing the code of a .exe file in c, it's possible to edit the code of a different exe file but not the exe file itself. It results in a segmentation fault.
Is there anyway to get around this ?
Code that…

Dhruv
- 645
- 9
- 17
0
votes
0 answers
How to generate Public and private keys for encryption using ATECC608A in C
I am implementing encryption and decryption of data using the ATECC608A chip. I need to know how to generate public and private keys using C programming. I am working on Keil. Are there any drivers available for this? I need to implement it using…

Padmashree N S
- 1
- 1
0
votes
1 answer
AWS Redshift database encryption
Is it possible to use different encryption for different databases inside of single Redshift?
I other words, I mean, that in case(theoretical case) for example of stolen hard drive from AWS data center, hackers will be unable to decrypt all…

alexanoid
- 24,051
- 54
- 210
- 410
0
votes
1 answer
Input length must be multiple of 8 when decrypting with padded cipher
I have a client/server application that encrypts or decrypts a message both on the client-side and server-side. However on decryption I keep getting the following error from the StackTrace
Input length must be multiple of 8 when decrypting with…

Raghad Madwar
- 1
- 1
- 2
0
votes
1 answer
Find out what Data Security Profiles look like
A colleague has left the company.
We know she implemented Data Security Profiles in our SAP BO 4.1 (unx universes)
She somehow implemented row-level security.
We do not know how. There are questions now how this row-level security is working.
To…

Henrov
- 1,610
- 1
- 24
- 52
0
votes
1 answer
How secure is it to access a database in Laravel without API key provided?
Prerequisites:
PHP: 5, Laravel: 5.1, MySQL: innodb 5.6.34.
Problem:
We built a web API with single endpoint "test". Now another endpoint ("health") should be added - this endpoint serves as health indicator for the API: when we call…

vlad.rad
- 1,055
- 2
- 10
- 28
0
votes
2 answers
What is the point of using tokenisation?
Whenever developing applications that need to store personal data (e.g. credit-cards), a common technique is to use tokenisation.
My understanding of the benefit is that the sensitive information in the database is represented by a 'meaningless'…

cleverpaul
- 935
- 4
- 12
- 28
0
votes
0 answers
How much secure it is for admin to have login on android app to add or remove data on app?
I want to develop an android app for displaying and accessing some data. Is it safe for administrator to have login on the same user app so that he can add or remove data which will be stored on some server?
If not how should I do it?

Akshay Borse
- 33
- 5
0
votes
2 answers
Will hashing two eual strings give same hash value
I need to anonymyze personal data in our MySql database. The problem is that I still need to be able to link two persons together after they have been anonymized.
I thought this could be done by hashing their social security number or e-mail…

Muleskinner
- 14,150
- 19
- 58
- 79
0
votes
2 answers
Generalized Random Response for local differential privacy implementation
I have been tasked with implementing a local (non-interactive) differential privacy mechanism. I am working with a large database of census data. The only sensitive attribute is "Number of children" which is a numerical value ranging from 0 to 13.…

Matt
- 112
- 6
0
votes
1 answer
Security risk to sensitive large binary data in react native based apps stored in file system?
Are there any security risk to sensitive large binary data stored in file system when using react native framework in mobile apps?

dann
- 282
- 2
- 7
0
votes
0 answers
Trasferring data from Google Cloud storage to AWS S3
I am transferring data from Google Cloud Storage to AWS S3 using distcp in EMR(I have made some configuration changes to EMR to achieve this). Is the data transfer secure? If not, what are the other options?

Raj
- 2,368
- 6
- 34
- 52
0
votes
2 answers
how to guarantee aws lambda caller that provided data remains secure
This question has some similarities to Disable AWS Lambda Environment Variables in its overall purpose, but is directed primarily at network access.
I'd like to provide the ability for a third party to invoke my Lambda function. The third party will…

mwag
- 3,557
- 31
- 38