Skip to main content

Questions tagged [storage]

Details on how data is being kept in memory/on disks, most frequently being applied to databases, media banks and backup-recovery solutions.

3 votes
1 answer
167 views

I have encrypted mounts in my Synology DS 918+ and I'm using an additional SSD leftover as a write-cache. When I have an encrypted directory mounted, are there unencrypted bits stored on the SSD? Do ...
Daniel W.'s user avatar
  • 307
0 votes
1 answer
203 views

I was reading question 180243 which states that using a password vault is the best option for credential storage. However this is rather cumbersome to setup. For a lower security use case (so no PII ...
Raven King's user avatar
0 votes
1 answer
265 views

I'm building a SaaS where some data needs to be stored in an encrypted format. You should be able to access this data from any device, as long as you remember your account credentials. Also, if you ...
lorenzo's user avatar
  • 103
1 vote
1 answer
128 views

I am new to security topics, please don't assume knowledge and spare no details if you're able to answer my questions. I am trying to design a system that performs the basic functionality of ...
SFG's user avatar
  • 11
2 votes
1 answer
223 views

For educational purposes, I am assembling a private network to act as a small sized company using BIND9 and OpenLDAP on FreeBSD 14.1 machines. The private networks' DNS servers, NS1 on 172.21.0.20 and ...
MaSc. H.'s user avatar
  • 321
2 votes
0 answers
437 views

I'm trying to build a cli tool for an application that provides a web-based API. The use-case is to allow performing common tasks through a command-line client, and perform quick admin actions from a ...
bodand's user avatar
  • 21
0 votes
2 answers
280 views

If I purchase a supposedly brand new USB stick (or micros SD, or similar portable storage devices) online, and I don't quite know the origin where they are produced, and I am a bit paranoid, is there ...
Tristan Tran's user avatar
2 votes
2 answers
238 views

In a scenario where a person wants to give away their device (magnetic disk included), leaving the disk usable for the receiver, how might that person go about destroying ALL data (except firmware) on ...
Anm's user avatar
  • 123
1 vote
1 answer
180 views

Company policy states that all internet-facing components must be protected with a WAF. However, I have an Azure Blobstorage that stores public web assets. I don't think putting it behind a WAF makes ...
tanyehzheng's user avatar
1 vote
1 answer
2k views

I'm building a website with Patreon integration and I have identified the need to store Patreon user's OAuth2 token in the database. I'm wondering what's the best way to do that, security-wise. Some ...
Vilx-'s user avatar
  • 1,122
0 votes
1 answer
400 views

I'm currently working on a server. This server is meant to be converged, as in be my storage server and the place publicly accessible services run on. Services like some API's in docker or k8s and ...
Rocco's user avatar
  • 103
2 votes
2 answers
1k views

I'm making a web application on the MERN stack which stores sensitive user data, in the form of a big block of text. The encryption method I am using is that when a user registers, a random key is ...
lostCoder's user avatar
0 votes
2 answers
1k views

I am developing an embedded device using a bootloader. This means that the device will store in its flash an encryption key for decrypting update packages and an ECC public key for verifying update ...
user2563661's user avatar
0 votes
1 answer
2k views

Is there some rough analysis or estimation of how much overhead in bytes an encryption using a public key could add to the final object?
Jim's user avatar
  • 221
3 votes
1 answer
254 views

I am studying information security, I have a question that I need help with. Which of the following storage options would give the organization the best chance of recovering data? A. Encrypted ...
Trung Nguyen's user avatar

15 30 50 per page
1
2 3 4 5
18