• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Hour 20. Database Administration > Encrypting and Decrypting a Database

Encrypting and Decrypting a Database

Before we move on to the more sophisticated methods of securing a database, it is important that you understand what any method of security does and does not provide for you. No matter how well you learn about and implement the techniques in this section, you will not be protected against someone attempting to read the data contained in a database. Even after you secure a database, someone with a disk editor can view the contents of the file. Although the data in the file will not appear in an easy-to-read format, the data is there and available for unauthorized individuals to see.

You might be feeling discouraged and asking why you should bother with security. Do not despair! Access enables you to encrypt a database, rendering the data in the database indecipherable in word processors, disk utilities, and other products that are capable of reading text. When a database is encrypted, it is difficult to decipher any of its data.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint