Statements (30)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Data Security Technique
|
gptkbp:appliesTo |
Cloud backups
Disk backups On-premises backups Tape backups |
gptkbp:canBe |
gptkb:RSA_encryption
AES encryption Hardware-based Software-based |
gptkbp:canBeManagedBy |
gptkb:software
Storage appliances |
gptkbp:compatibleWith |
Regulatory requirements
Industry standards |
https://www.w3.org/2000/01/rdf-schema#label |
Backup Encryption
|
gptkbp:isRecommendedBy |
Security best practices
|
gptkbp:partOf |
Backup strategy
|
gptkbp:prevention |
Unauthorized access to backup data
|
gptkbp:reduces |
Data breaches
Data leaks |
gptkbp:relatedTo |
Small businesses
Individuals Enterprises |
gptkbp:requires |
Key management
|
gptkbp:usedFor |
Protecting backup data
|
gptkbp:uses |
Encryption keys
Encryption algorithms |
gptkbp:bfsParent |
gptkb:SQL_Server_2014
gptkb:SQL_Server_2016 gptkb:SQL_Server_2014_and_later |
gptkbp:bfsLayer |
7
|