Statements (33)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Data_security_technique
|
| gptkbp:appliesTo |
Backup data
|
| gptkbp:canBe |
gptkb:RSA
gptkb:AES gptkb:3DES On-premises Cloud-based Hardware-based Software-based Differential backup encryption Full backup encryption Incremental backup encryption |
| gptkbp:canBeCompromisedBy |
Poor key management
Weak passwords |
| gptkbp:canBeManagedBy |
gptkb:software
|
| gptkbp:isRecommendedBy |
Security best practices
|
| gptkbp:notRecommendedFor |
Compliance requirements
Sensitive data |
| gptkbp:partOf |
Backup strategy
|
| gptkbp:prevention |
Unauthorized access
|
| gptkbp:protectedBy |
Data at rest
Data in transit |
| gptkbp:purpose |
Protect data confidentiality
|
| gptkbp:regulates |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:GDPR |
| gptkbp:requires |
Key management
Encryption keys |
| gptkbp:supportedBy |
Many backup vendors
|
| gptkbp:uses |
Encryption algorithms
|
| gptkbp:bfsParent |
gptkb:64-bit_SQL_Server
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Backup encryption
|