What is an encryption of a full disk?
full disk encryption is data coding that is located on the disk, including programs that encrypt partitions into operating systems. Some computer users use partitions as a way of dividing the hard disk storage space. Encryption covers the content of a message or file so that only someone who has access to the encryption key that does not throw the file can read it. The aim of data encryption is to prevent unwanted users from accessing data stored on computer units. Complete disk encryption encrypts operating system files and temporary files or virtually all and all files found on the disk that is encrypted. If hardware -based hardware encryption is used, the main boot recording can also be encrypted. Hardware disk encryption generates and stores encryption and user information in the drive hardware; This information is therefore held independently of the operating system and software. This adds additional security against potential threats that are attacked by attackers whoThey have access to the computer's memory. Hardware -based encryption is also beneficial because it can be switched on for an indefinite period, which means that the user does not have to remember to turn it on if necessary.
Thedifferent encryption software with full disc provides a number of factors. Free software programs, such as COMODO disk disk disk disk, provide the basic levels of disk encryption with the advantage of not having to pay for them. With more advanced programs you can ensure security for different types of storage devices. One example is the full disk encryption program Bitlocker, which is part of Microsoft Windows 7. Bitlocker offers security for internal hardware as well as external hard Drives and Problem Stock Drivs such as USB Flash Drives.
There are several security certifications that can be obtained for software that provides complete disk encryption, including FIPS 140-2 and common criticismera eal4. FIPS 140-2 means the standard of information processing and is an American government accredited security standard for programs that use encryption. On the other hand, the common EAL4 criteria is an international standard for security of the computer.
For all your ability to handle safety threats, many encryption programs with a full disc can be attacked by a cold boot attack. In this situation, the encryption keys are stolen by turning off the computer and after restarting the computer without the correct weaning procedure. The attacker can then access the information when memory information or DRAM is beaten into a file. Programs such as Bitarmor offer full disk encryption that protect against cold boot attacks during hibernation, shutdown, as well as during sleep and screen modes.