Full Disk Encryption

Full disk encryption translates data into a code, shielding it from anyone who doesn’t have the corresponding key to decode it. Full disk encryption allows users to secure all the data stored on a device. It encrypts the whole hard drive as well as the data that needs to be protected. When the user turns on their computer’s operating system, they’ll enter one or more factors of authentication before their data can be decrypted.

Today, most data storage systems use a more secure form of encryption called asymmetric cryptography. This is also known as public-key cryptography, because data can be encrypted using a public key but requires a private one to be decrypted. Asymmetric cryptography makes it much more difficult for anyone but the authorized person to decrypt the data because it uses advanced mathematical keys for the decryption.

Disk vs. File Encryption

One advantage of disk encryption is the longevity of the process: a hard disk or solid-state drive will hold data securely while the computer is turned off or if it shuts down unexpectedly. Main memory or RAM, on the other hand, will only hold data that’s actively in use on the operating system or device. Although it’s slower, a disk drive will store data after the operating system or device shuts down or loses power. Full disk encryption won’t keep transferred or sent data encrypted if you email data, send it over a network, or transfer it to a new storage device, but if you pair it with file-level encryption (FLE), you can manually encrypt any data that you need to send.

File encryption requires more time and effort because it doesn’t cover an entire hard drive automatically. But it’s helpful because it allows users to specifically choose which files to encrypt and then send those files to others, thus protecting the data during transit. Before the user stores their data, file level encryption also may require them to complete further tasks.

Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

Text Abbreviations reviewed by Web Webster   From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

Telecommunication

Telecommunication refers to telephony and cellular network technology. However, the broader definition includes...

Spoofing

What is spoofing? As it pertains to cybersecurity, spoofing is when a person disguises...

How to Indent in...

Microsoft Word is a graphical word...