- Practical Network Scanning
- Ajay Singh Chauhan
- 172字
- 2022-07-12 10:43:12
Full-disk encryption
Let's explore the process in detail, looking at how the whole disk encryption works. Full disk encryption encrypts an entire disk drive. When an authenticated user accesses a file from a fully encrypted drive, the encryption technology decrypts the file using the decryption key provided at system startup, and the rest of the drive remains encrypted. This method ensures the protection of the hard drive if a system failure occurs or the system is deliberately shutdown. The primary goal of full disk encryption is that the drive and files remain encrypted during the system shutdown state. On a running system, the encryption is technically not in place for users to access files. This is because the operating system has the decryption key to access files on the disk.

Full disk encryption is a perfect solution for devices like notebooks and desktops, which shutdown at some point. Full disk encryption helps to protect data in the event of the physical loss of a disk and makes more sense for portable devices.
- 云原生安全:攻防實踐與體系構建
- 信息安全導論(在線實驗+在線自測)
- CSO進階之路:從安全工程師到首席安全官
- 云原生安全技術實踐指南
- 網絡安全與攻防入門很輕松(實戰超值版)
- 信息安全導論(第2版)
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 實用黑客攻防技術
- 網絡安全大數據分析與實戰
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Mastering Linux Security and Hardening
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- 網絡空間安全法律問題研究
- 數字銀行安全體系構建