dcsimg
Main » TERM » F »

Full Disk Encryption

Full disk encryption translates data into a code, shielding it from anyone who doesn’t have the corresponding key to decode it. Full disk encryption allows users to secure all the data stored on a device. It encrypts the whole hard drive as well as the data that needs to be protected. When the user turns on their computer’s operating system, they’ll enter one or more factors of authentication before their data can be decrypted.

Today, most data storage systems use a more secure form of encryption called asymmetric cryptography. This is also known as public-key cryptography, because data can be encrypted using a public key but requires a private one to be decrypted. Asymmetric cryptography makes it much more difficult for anyone but the authorized person to decrypt the data because it uses advanced mathematical keys for the decryption.

Disk vs. File Encryption

One advantage of disk encryption is the longevity of the process: a hard disk or solid-state drive will hold data securely while the computer is turned off or if it shuts down unexpectedly. Main memory or RAM, on the other hand, will only hold data that’s actively in use on the operating system or device. Although it’s slower, a disk drive will store data after the operating system or device shuts down or loses power. Full disk encryption won’t keep transferred or sent data encrypted if you email data, send it over a network, or transfer it to a new storage device, but if you pair it with file-level encryption (FLE), you can manually encrypt any data that you need to send.

File encryption requires more time and effort because it doesn’t cover an entire hard drive automatically. But it’s helpful because it allows users to specifically choose which files to encrypt and then send those files to others, thus protecting the data during transit. Before the user stores their data, file level encryption also may require them to complete further tasks.










LATEST ARTICLES
Texting & Chat Abbreviations

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top... Read More »

Huge List of Computer Certifications

Have you heard about a computer certification program but can't figure out if it's right for you? Use this handy list to help you decide. Read More »

STUDY GUIDES
Computer Architecture Study Guide

Computer architecture provides an introduction to system design basics for most computer science students. Read More »

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »

The Five Generations of Computers

Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »