You are on page 1of 1

Recommendation

Based on the gathered information about the poor database encryption deployment, the researcher recommends that when selecting algorithms to encrypt covered data, keep these considerations in mind:

For the same encryption algorithm, longer encryption key length generally provides stronger protection.

Long complex passphrases are stronger than shorter passphrases. Please refer to campus passphrase security standard for additional guidance.

Strong encryption generally consumes more CPU resources than weak encryption.

When connecting to wireless networks to access a system handling covered data, only connect to wireless networks employing cryptographically strong wireless encryption standards such as WPA2. Encryption mechanisms described in the section above must also be applied in addition to strong wireless network encryption to ensure end-to-end protection.

You might also like