Statements (29)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Data_Security_Technique
|
| gptkbp:appliesTo |
Cloud backups
Disk backups On-premises backups Tape backups |
| gptkbp:canBe |
gptkb:RSA_encryption
AES encryption Hardware-based Software-based |
| gptkbp:canBeManagedBy |
gptkb:software
Storage appliances |
| gptkbp:compatibleWith |
Regulatory requirements
Industry standards |
| gptkbp:isRecommendedBy |
Security best practices
|
| gptkbp:partOf |
Backup strategy
|
| gptkbp:prevention |
Unauthorized access to backup data
|
| gptkbp:reduces |
Data breaches
Data leaks |
| gptkbp:relatedTo |
Small businesses
Individuals Enterprises |
| gptkbp:requires |
Key management
|
| gptkbp:usedFor |
Protecting backup data
|
| gptkbp:uses |
Encryption keys
Encryption algorithms |
| gptkbp:bfsParent |
gptkb:SQL_Server_2014
gptkb:SQL_Server_2016 |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Backup Encryption
|