💻
Database Magazine
GlossaryBest Practices and TipsFAQsResources
  • Database Magazine
  • Glossary of Terms
    • A
      • Archive
      • Active backup for Office 365
      • AWS Backup
      • Active Directory
      • Agent
      • Anti-ransomware solutions
    • B
      • Backup
      • Backup and Recovery
      • Backup as a service
      • Bare-metal backup
      • Backup repository
      • Backup schedule
      • Backup Solutions
      • Business Continuity
    • C
      • Cloud Backup
      • Continuous Data Protection (CDP)
      • Compression
      • Consistency check
      • Cold Backup
      • Cloud Data Management (CDM)
    • D
      • Data Deduplication
      • Disaster Recovery (DR)
      • Differential Backup
      • Disk-to-Disk (D2D) Backup
      • Disaster Recovery (DR)
    • E
      • Encryption
      • Endpoint Backup
      • Erasure Coding
      • Export/Import
      • Enterprise Backup Software
    • F
      • Full Backup
      • Failover
      • File-Level Backup
      • File Sync and Share
      • Fireproof and Waterproof Storage
    • G
      • Grandfather-Father-Son (GFS)
      • Granular Recovery
      • Geographically Dispersed Backup
      • Ghost Imaging
      • Global Deduplication
    • H
      • Hybrid Backup
      • Hot Backup
      • High Availability (HA)
      • Hard Disk Drive (HDD)
      • Hybrid Cloud Backup
    • I
      • Incremental Backup
      • Image-based Backup
      • Instant Recovery
      • Integrity Check
      • Infrastructure as a Service (IaaS)
    • J
      • Journaling
      • Job Scheduler
      • Just-in-Time Recovery
      • Journal-Based Recovery
      • Jumbo Frames
    • K
      • Key Management
      • Kernel-Based Recovery
      • Kickstart
      • Kept Versions
      • Kill Switch
    • L
      • Long-Term Retention
      • Log-Based Recovery
      • Local Backup
      • Latency
      • Load Balancing
    • M
      • Metadata
      • Mirroring
      • Multi-Site Replication
      • Media Rotation
      • Mounting
    • N
      • Nearline Storage
      • Network-Attached Storage (NAS)
      • Non-Destructive Recovery
    • O
      • Offsite Backup
      • Online Backup
      • Object Storage
      • Offsite Replication
      • Open File Backup
      • Overwrite Protection
      • One-Click Restore
    • P
      • Point-in-Time Recovery
      • Primary Storage
      • Physical Backup
      • Private Cloud Backup
      • P2V (Physical-to-Virtual) Conversion
    • Q
      • Quiesce
      • Quick Recovery
      • Quota Management
      • Quality of Service (QoS)
      • Query-Based Recovery
    • R
      • Recovery Point Objective (RPO)
      • Recovery Time Objective (RTO)
      • Replication
      • Restore
      • Retention Policy
    • S
      • Snapshot
      • Storage Area Network (SAN)
      • Secondary Storage
      • Single Point of Failure (SPOF)
      • Synthetic Full Backup
    • T
      • Tape Backup
      • Two-Factor Authentication (2FA)
      • Thin Provisioning
      • Test Restore
      • Transaction Log
    • U
      • Universal Restore
    • V
      • Versioning
      • Virtual Machine (VM) Backup
      • Verification
      • Vaulting
      • Virtual Tape Library (VTL)
    • W
      • Warm Site
      • Workload Mobility
      • WAN Acceleration
      • Write-Once, Read-Many (WORM)
      • Windows Backup
    • X
      • XOR (Exclusive OR)
    • Y
      • Yearly Backup
    • Z
      • Zero Data Loss
  • Best Practices and Tips
    • How to backup Microsoft 365 using third-party backup tools
  • FAQs
    • Does Office 365 have backups?
    • What is the best backup for Office 365?
    • How do I backup my Office 365 backup?
    • What is the backup tool for Office 365?
    • Does Office 365 have storage?
    • Is OneDrive a reliable backup solution?
    • What is an Incremental Backup?
    • Does VMware have a backup tool?
    • What is VMware considered backup?
    • What are the types of backup in VMware?
    • Is VMware snapshot a backup?
    • What is the best way to backup a Hyper-V VM?
    • How do I create a backup in Hyper-V?
    • Should you backup a Hyper-V host?
    • What is the difference between Hyper-V snapshot and backup?
    • What is the disaster recovery in IT industry?
    • What should an IT disaster recovery plan include?
    • What are the main steps in IT disaster recovery?
    • What is the difference between IT security and disaster recovery?
    • What is a NAS backup?
    • How do I backup my NAS data?
    • Can NAS be used as a backup?
    • What is Nutanix used for?
    • What is Nutanix storage?
    • What is RPO and RTO in Nutanix?
    • What is MSP backup?
    • What is managed backup service?
    • How do I restore my MSP backup?
    • What is Azure Backup?
    • What is the purpose of Azure Backup?
    • What are the different types of Azure cloud backups?
    • Is Azure Backup a PaaS?
    • What are the downsides of Backblaze?
    • Does Backblaze backup everything?
    • Is Backblaze better than Google Drive?
  • Resources
Powered by GitBook
On this page
  • Definition
  • Explanation
  • Related terms
  1. Glossary of Terms
  2. E

Encryption

Discover the importance of Encryption, a vital security measure that safeguards sensitive data by converting it into an unreadable format.

Definition

Encryption is the process of converting plain, readable data into a coded form known as ciphertext, using algorithms and encryption keys. It is used to protect data confidentiality and ensure that only authorized parties can access and understand the information.

Explanation

Encryption provides a means of securing sensitive data by transforming it into an unreadable format. The process involves using an encryption algorithm and an encryption key to scramble the original data, resulting in ciphertext that is unintelligible without the corresponding decryption key.

Encryption can be applied to various types of data, including files, databases, emails, and network communications. It adds a layer of protection to prevent unauthorized access or eavesdropping by potential attackers, even if they gain physical or network-level access to the data.

Two common types of encryption are symmetric encryption and asymmetric encryption. In symmetric encryption, the same key is used for both encryption and decryption, requiring the key to be securely shared between authorized parties. In asymmetric encryption (also known as public-key encryption), a pair of mathematically related keys, consisting of a public key and a private key, are used. The public key is freely distributed, while the private key remains secret and is used for decryption.

Encryption is widely used in various contexts, including data storage, data transmission over networks, secure messaging applications, and protecting sensitive information in cloud environments. It is an essential component of data protection strategies and helps safeguard data privacy and integrity.

Related terms

  • Decryption: The process of converting encrypted data (ciphertext) back into its original form (plaintext) using the appropriate decryption key.

  • Cryptography: The science and practice of securing communication through encryption and other techniques.

  • Encryption algorithm: A mathematical algorithm or set of rules used to perform the encryption and decryption processes.

  • Key management: The processes and practices involved in securely generating, distributing, storing, and revoking encryption keys.

  • Data protection: Measures and techniques implemented to safeguard data from unauthorized access, loss, or corruption.

  • Secure sockets layer (SSL) / Transport Layer Security (TLS): Protocols used to provide secure communication over the internet by encrypting data transmitted between servers and clients.

  • Public key infrastructure (PKI): A system of hardware, software, policies, and procedures used to manage and distribute digital certificates and public keys in a secure manner.

PreviousENextEndpoint Backup

Last updated 1 year ago