Create a sql query to generate a new database master key

Assignment Help Database Management System
Reference no: EM132084529

The objective of this activity is to practice generating keys and encrypting/decrypting data. Document each step by taking a screen shot of the Query Editor window after successfully executing each SQL query.

1. In SQL Server Management Studio, open a new Query Editor window, which you will use for completing all steps in this activity.

2. Create a SQL query to generate a new database master key and certificate for the HandsOnOne database. Take a screenshot of the Query Editor after you have executed this SQL command to show that it was completed successfully.

3. Construct a SQL query to generate a new symmetric key for encrypting data. The symmetric key should use the AES algorithm with a 256-bit key size, and it should be protected by the certificate you created in Step 2. Take a screenshot of the Query Editor after you have executed this SQL command to show that it was completed successfully.

4. Construct a SQL query to alter the Customer table and add a new column named CustomerNameEncrypted with data type varbinary(128). This column will be used to store the encrypted values of the CustomerName column. Take a screenshot of the Query Editor after you have executed this SQL command to show that it was completed successfully.

5. Using the symmetric key you created in Step 2, write an SQL UPDATE query that encrypts the values in the CustomerName column and adds the encrypted values to the CustomerNameEncrypted column. Take a screenshot of the Query Editor after you have executed this SQL command to show that it was completed successfully.

6. Construct a SQL SELECT query to view the encrypted values of the CustomerNameEncrypted column in the Customer table. Take a screenshot of the Query Editor after you have executed this SQL command to show that it was completed successfully.

7. Construct a SELECT SQL query that uses the symmetric key to decrypt the values in the CustomerNameEncrypted column. Note that you will need to convert the hexidecimal values into a character string in order to read the decrypted values. Take a screenshot of the Query Editor after you have executed this SQL command to show that it was completed successfully.

Reference no: EM132084529

Questions Cloud

Which do you feel was the most damaging cause : Analyze specific social, political, economic, and cultural reasons for Rome's gradual collapse. Which do you feel was the most damaging cause, and why?
Identify which categories you experienced in high school : Using Marcia's identity statues (Identity Achievement, Moratorium, Identity Foreclosure, and Identity Diffusion), Identify which categories you experienced
Discuss pros and cons of drawing up a partnership agreement : The colleague stipulates that due to your past relationship, Discuss the pros and cons of drawing up a partnership agreement
Weeks and months following the nazi invasion of russia : How did this incident differ from the other situations that arose in the weeks and months following the Nazi invasion of Russia?
Create a sql query to generate a new database master key : In SQL Server Management Studio, open a new Query Editor window, which you will use for completing all steps in this activity.
Calculate indifference point between the two cost structures : Calculate the indifference point between the two cost structures, that is, the amount of unit sales that produce exactly the same operating income for Company
Russian revolution have in the war : What effect did the Russian Revolution have in the war? What advancements: medical, technological etc came out of the war?
What is the net cash provided by financing activities : Joy Elle's Vegetable Market had the following transactions during 2008: What is the net cash provided by financing activities
Compare the problem space with the solution space : Compare and contrast the problem space with the solution space.What is the relationship between product specifications and requirements?

Reviews

Write a Review

Database Management System Questions & Answers

  Prepare dml statement for each dml requirement

In a Word document, prepare the following for each DML requirement you came up during Step II: The description for your requirement.

  Create a table and call it books

create database csci2006; Create a table and call it books. Use the following command:

  Write a script that deletes the gettoplovendors procedure

Use the Management Studio to write a script that deletes the GetToplOVendors procedure and the ApClrObjectsEx assembly. Check that the procedure and assembly exist before deleting them.

  What is a deletion anomaly

What is a deletion anomaly and how can we avoid encountering one in our database design? Please use an example to explain.

  List the name of each publisher that is located in new york

List the name of each publisher that is located in New York.

  Relational database modelling techniques and e-r diagram

Practical experience in using Entity-Relationship and Relational Database modelling techniques - design using an E-R diagram an entity-relationship model of the problem, convert the model into a relational model, and assess the normal form of each ..

  After a lengthy description he further challenged you to

you are the new chief information officer for acme widgets. the president of the company recently asked you what you

  Whats the difference between a filter and a query

Whats the difference between a filter and a query

  Beginning of the futuristic upcoming driverless- cars

Do you think that there is enough accountability with these companies as it pertains to data security - what are your thoughts about computing clouds or cloud

  Create a formula with structured references

Create a formula with structured references to calculate the percentage of the list price. Format the field with Percent Style with one decimal place.

  Difference between the quoted amount and paid amount

Using VLOOKUP function complete the following columns from "Project-Database" sheet- Difference between the Quoted amount and Paid Amount to the subcontractor

  Examine the common threats to data systems like web

suppose that you are currently employed as an information security manager for a medium-sized software development and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd