- • This session focuses on protecting the data with cryptographic methods rather than access controls
- • Restricting application and data access is critical, but...
- • many developers and software tools already deal with access control issues fairly well (Apache, Linux, MySQL, PHP, ...)
- • Data is vulnerable at so many points that it takes massive effort to create a very low risk environment for it if only relying on access control and policies