File Encryption

File encryption protects individual files or file systems by encrypting them with a specific key, making them accessible only to the keyholder. The goal is to prevent malicious or unauthorized parties from accessing files that are stored on the disk. Support for file encryption can be built into an operating system or file system. A decryption key allows access to the sensitive files. File encryption is helpful if a user needs to send individual files securely over the internet or store them on a removable device such as a USB stick. A file in transit is sometimes referred to as data in motion.

Cryptography and file encryption

Cryptography, the practice of encrypting and decrypting sensitive data, takes two forms: asymmetric or public-key cryptography, and symmetric cryptography. Asymmetric cryptography uses a generally known public encryption key, allowing anyone with the public key to encrypt data. However, only users with the private key can decrypt the data, which creates greater security. Symmetric cryptography uses a single key for encryption and decryption.

Full disk encryption, on the other hand, secures an entire disk or drive but doesn’t encrypt individual files within the disk. It’s wise to use file encryption and full disk encryption simultaneously for extra security, so that both your hard drive and your individual files are protected.

Some companies are encrypting their sensitive data in the cloud, but they’re the minority. Storing encrypted files in cloud applications can be more complicated. However, IT professionals believe the cloud will become more important, which may mean more encrypted file storage in cloud applications.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...