There are a number of methods that are said to be good for database encryption. Some of the best rated options include GNU Privacy Guard, Disk Utility, TrueCrypt, 7-Zip and AxCrypt.
IPSec.
You can protect your data-base system by backing up the database in question. You can also use various encryption services to provide more layers of protection.
encryption
Public-Key Encryption RSA Technology
stream ciphers and block ciphers
It is an online database.
Twofish, Advanced Encryption Standard, Blowfish, Serpent, CAST 5, RC4, TDES, and IDEA are all examples of symmetric encryption methods. In short, any algorithm that uses the same or similar cryptographic keys for encryption and decryption is a symmetric encryption method. Symmetric encryption methods are also divided into two different categories, stream ciphers and block ciphers. These two encryption methods are much like the difference between an interpreter and a compiler in programming. Stream encrypts individual bytes one at a time, while Block encrypts volumes as a whole.
WPA2 PSK Wi fi protected access
pishing
Nowadays, simply hashing the database does not provide enough encryption as hackers can run brute forcing software and/or dictionary attacks against them, also using hash decrypters. With today's sophisticated GPUs, millions of hashes can be cracked a second with programs like John the Ripper and Hashcat. Salting the passwords and information is safer, but still not foolproof by a long way.
Ans:Loading a class in JDBC For getting connection to database and to query database for INSERT,UPDATE,DELETE and to do some operations on database through java programs you need to load the jdbc driver class for a particular database provided by the database provider for that you use class.forName() Method this method will load the class which are necessary for database operations
Encryption is the best.