- Practical Network Scanning
- Ajay Singh Chauhan
- 172字
- 2022-07-12 10:43:12
Full-disk encryption
Let's explore the process in detail, looking at how the whole disk encryption works. Full disk encryption encrypts an entire disk drive. When an authenticated user accesses a file from a fully encrypted drive, the encryption technology decrypts the file using the decryption key provided at system startup, and the rest of the drive remains encrypted. This method ensures the protection of the hard drive if a system failure occurs or the system is deliberately shutdown. The primary goal of full disk encryption is that the drive and files remain encrypted during the system shutdown state. On a running system, the encryption is technically not in place for users to access files. This is because the operating system has the decryption key to access files on the disk.

Full disk encryption is a perfect solution for devices like notebooks and desktops, which shutdown at some point. Full disk encryption helps to protect data in the event of the physical loss of a disk and makes more sense for portable devices.
- 計(jì)算機(jī)網(wǎng)絡(luò)安全技術(shù)(第6版·慕課版)
- 腦洞大開:滲透測(cè)試另類實(shí)戰(zhàn)攻略
- CSO進(jìn)階之路:從安全工程師到首席安全官
- 網(wǎng)絡(luò)空間安全:管理者讀物
- 工業(yè)物聯(lián)網(wǎng)安全
- 黑客攻防與無線安全從新手到高手(超值版)
- 軟件開發(fā)安全之道:概念、設(shè)計(jì)與實(shí)施
- 信息安全等級(jí)保護(hù)測(cè)評(píng)與整改指導(dǎo)手冊(cè)
- 電腦安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Mastering Metasploit
- 網(wǎng)絡(luò)空間安全法律問題研究
- 計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究
- 隱私保護(hù)機(jī)器學(xué)習(xí)
- Blockchain Development with Hyperledger