medical device data encryption
the core information of the medical equipment industry is 80% stored in a structured form in a database. As the carrier of core assets, the database will bring the most painful losses once it is leaked. At present, the importance of database security protection as the "last mile" of information security protection tasks has been recognized by more and more departments.
According to the analysis of the Verizon statistical report of the international authoritative organization, the current 96% data attacks are aimed at the database; the market survey of "how the core data is lost" shows that the 75% data loss comes from the database, and the database has become the most important for intruders. Attack targets and sources of leaks.
Data encryption technologies include data encryption, data decryption, digital signature, signature identification, and digital certification. According to the characteristics of file-type databases, database encryption can generally include external encryption, internal encryption, and hardware encryption.
External encryption: For file IO operations or operating systems, there are three ways to interface the database management system with the operating system: one is to directly use the functions of the file system; the other is to use the I/O module of the operating system; The third is to directly call storage management.
In-library encryption: Starting from all aspects of relational databases, it is easy to form the idea of in-library encryption. The key terms for relational databases are: tables, fields, rows, and data elements.
hardware encryption: Compared with software encryption, it means that a layer of hardware is added between the physical memory and the database system as the middle layer, and the encryption and decryption work are completed by the added hardware.