17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3 – Schema Architecture StrategiesUse HomeLending;GOSELECTln.Lender_Case_Number,cr.Credit_Score,cr.Beacon_Score,cr.Date_Report_RequestedFROMdbo.Loan lnINNER JOIN dbo.Loan_Credit_Report lncrON ln.Loan_ID = lncr.Loan_IDINNER JOIN [SERVER2\SQLINSTANCEB].CreditReport.dbo.Credit_Report crON lncr.Credit_Report_ID = cr.Credit_Report_ID;GOListing 3-10: Query the Linked Server.Network SecurityThere are some additional security considerations when implementing linkedservers as a means of protecting sensitive information. Data will be travelingacross network lines and potentially across the Internet. Performance will beaffected but, more importantly given our security focus, it will also introduce apotential vulnerability to data being gleaned through hackers monitoringnetwork traffic.The encryption features of SQL Server are designed to protect data at rest,which is the data while it is in storage. Once the data is queried and decryptedit is considered data in transit and the protection of the data is dependent uponother security measures on the network such as Secure Sockets Layer (SSL). Ifthe data that is stored on a linked server is encrypted, the encryption anddecryption processes will likely occur at the linked server; otherwise the scriptin Listing 3-10 will need to include the commands for cryptographic functions.More details in regard to these cryptographic functions will be discussed in thecoming chapters.82

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!