Abstract
In Chapter 5, you learned about the SQL Server encryption hierarchy and how data can be encrypted as part of a defense-in-depth strategy. In some situations, however, encrypted cells can become vulnerable to attack. In this chapter, you will learn about whole value substitution attacks and how to prevent them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Peter A. Carter
About this chapter
Cite this chapter
Carter, P.A. (2018). Whole Value Substitution Attacks. In: Securing SQL Server. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4161-5_14
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4161-5_14
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4160-8
Online ISBN: 978-1-4842-4161-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)