Skip to main content

Questions tagged [storage]

Details on how data is being kept in memory/on disks, most frequently being applied to databases, media banks and backup-recovery solutions.

3 votes
1 answer
165 views

Is a write-cache in my Synology NAS exposing unencrypted data?

I have encrypted mounts in my Synology DS 918+ and I'm using an additional SSD leftover as a write-cache. When I have an encrypted directory mounted, are there unencrypted bits stored on the SSD? Do ...
Daniel W.'s user avatar
  • 307
0 votes
1 answer
194 views

Reasonable model for Storing credentials for use in scripts

I was reading question 180243 which states that using a password vault is the best option for credential storage. However this is rather cumbersome to setup. For a lower security use case (so no PII ...
Raven King's user avatar
0 votes
1 answer
260 views

Is encrypt a private key using the user password and store it into the server a bad idea?

I'm building a SaaS where some data needs to be stored in an encrypted format. You should be able to access this data from any device, as long as you remember your account credentials. Also, if you ...
lorenzo's user avatar
  • 103
1 vote
1 answer
124 views

Is it safe to store harmful files to storage like AWS S3?

I am new to security topics, please don't assume knowledge and spare no details if you're able to answer my questions. I am trying to design a system that performs the basic functionality of ...
SFG's user avatar
  • 11
2 votes
1 answer
223 views

TLS certificates on a network drive/storage

For educational purposes, I am assembling a private network to act as a small sized company using BIND9 and OpenLDAP on FreeBSD 14.1 machines. The private networks' DNS servers, NS1 on 172.21.0.20 and ...
MaSc. H.'s user avatar
  • 321
2 votes
0 answers
424 views

User token in command line tool

I'm trying to build a cli tool for an application that provides a web-based API. The use-case is to allow performing common tasks through a command-line client, and perform quick admin actions from a ...
bodand's user avatar
  • 21
0 votes
2 answers
277 views

Clean wipe of USB stick of any hidden codes

If I purchase a supposedly brand new USB stick (or micros SD, or similar portable storage devices) online, and I don't quite know the origin where they are produced, and I am a bit paranoid, is there ...
Tristan Tran's user avatar
2 votes
2 answers
238 views

Reliably destroy all information on magnetic disk through digital medium

In a scenario where a person wants to give away their device (magnetic disk included), leaving the disk usable for the receiver, how might that person go about destroying ALL data (except firmware) on ...
Anm's user avatar
  • 123
1 vote
1 answer
177 views

Do I need to protect my Azure Blobstorage with a WAF if all the contents inside are for public consumption?

Company policy states that all internet-facing components must be protected with a WAF. However, I have an Azure Blobstorage that stores public web assets. I don't think putting it behind a WAF makes ...
tanyehzheng's user avatar
1 vote
1 answer
2k views

What are the best practices to safely store OAuth2 tokens in a database?

I'm building a website with Patreon integration and I have identified the need to store Patreon user's OAuth2 token in the database. I'm wondering what's the best way to do that, security-wise. Some ...
Vilx-'s user avatar
  • 1,122
0 votes
1 answer
394 views

Security considerations and differences between Bare metal and Virtualization

I'm currently working on a server. This server is meant to be converged, as in be my storage server and the place publicly accessible services run on. Services like some API's in docker or k8s and ...
Rocco's user avatar
  • 103
2 votes
2 answers
1k views

Where or how to persist a decryption key in a React app?

I'm making a web application on the MERN stack which stores sensitive user data, in the form of a big block of text. The encryption method I am using is that when a user registers, a random key is ...
lostCoder's user avatar
0 votes
2 answers
1k views

Strategy for storing private keys used in an embedded device

I am developing an embedded device using a bootloader. This means that the device will store in its flash an encryption key for decrypting update packages and an ECC public key for verifying update ...
user2563661's user avatar
0 votes
1 answer
2k views

Size overhead of encryption approximation

Is there some rough analysis or estimation of how much overhead in bytes an encryption using a public key could add to the final object?
Jim's user avatar
  • 221
3 votes
1 answer
253 views

Storage options would give the organization the best chance of recovering data

I am studying information security, I have a question that I need help with. Which of the following storage options would give the organization the best chance of recovering data? A. Encrypted ...
Trung Nguyen's user avatar

15 30 50 per page
1
2 3 4 5
18