In the classic asymmetric encryption tiered-server scenario, the front-end (or middle tier) application would have...
access to the public key and use this to encrypt the data. Then, a second system (presumably more secure) would have access to the private key for accessing this data (such as the SSN info). In this way, if the front end was compromised and the data was extracted from the database, the data would be useless without the private key. Since it does not exist on the front end nor the database, the attacker would still need to find this "secure" server with the private key in order to access the data.
Related Q&A from Steven Andres
Learn how to create a SQL Server user authentication schema having password and tracked data changes requirements and how it involves Windows ...continue reading
Find how to create a SQL Server 2000 login account and then set user account rights to specific databases with "db_owner."continue reading
Learn why SQL Server 2000 connection is lost on the client side when database administrator changes 'SA' password on the SQL Server domain.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.