Statements (34)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Data security technique
|
gptkbp:appliesTo |
Backup data
|
gptkbp:canBe |
gptkb:RSA
gptkb:AES gptkb:3DES On-premises Cloud-based Hardware-based Software-based Differential backup encryption Full backup encryption Incremental backup encryption |
gptkbp:canBeCompromisedBy |
Poor key management
Weak passwords |
gptkbp:canBeManagedBy |
gptkb:software
|
https://www.w3.org/2000/01/rdf-schema#label |
Backup encryption
|
gptkbp:isRecommendedBy |
Security best practices
|
gptkbp:notRecommendedFor |
Compliance requirements
Sensitive data |
gptkbp:partOf |
Backup strategy
|
gptkbp:prevention |
Unauthorized access
|
gptkbp:protectedBy |
Data at rest
Data in transit |
gptkbp:purpose |
Protect data confidentiality
|
gptkbp:regulates |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:GDPR |
gptkbp:requires |
Key management
Encryption keys |
gptkbp:supportedBy |
Many backup vendors
|
gptkbp:uses |
Encryption algorithms
|
gptkbp:bfsParent |
gptkb:64-bit_SQL_Server
gptkb:MS_SQL_Server |
gptkbp:bfsLayer |
7
|