Full Disk Encryption

Full disk encryption translates data into a code, shielding it from anyone who doesn’t have the corresponding key to decode it. Full disk encryption allows users to secure all the data stored on a device. It encrypts the whole hard drive as well as the data that needs to be protected. When the user turns on their computer’s operating system, they’ll enter one or more factors of authentication before their data can be decrypted.

Today, most data storage systems use a more secure form of encryption called asymmetric cryptography. This is also known as public-key cryptography, because data can be encrypted using a public key but requires a private one to be decrypted. Asymmetric cryptography makes it much more difficult for anyone but the authorized person to decrypt the data because it uses advanced mathematical keys for the decryption.

Disk vs. File Encryption

One advantage of disk encryption is the longevity of the process: a hard disk or solid-state drive will hold data securely while the computer is turned off or if it shuts down unexpectedly. Main memory or RAM, on the other hand, will only hold data that’s actively in use on the operating system or device. Although it’s slower, a disk drive will store data after the operating system or device shuts down or loses power. Full disk encryption won’t keep transferred or sent data encrypted if you email data, send it over a network, or transfer it to a new storage device, but if you pair it with file-level encryption (FLE), you can manually encrypt any data that you need to send.

File encryption requires more time and effort because it doesn’t cover an entire hard drive automatically. But it’s helpful because it allows users to specifically choose which files to encrypt and then send those files to others, thus protecting the data during transit. Before the user stores their data, file level encryption also may require them to complete further tasks.

Top Articles

The Complete List of Text Abbreviations & Acronyms

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top...

How to Create a Website Shortcut on Your Desktop

This Webopedia guide will show you how to create a desktop shortcut to a website using Firefox, Chrome or Internet Explorer (IE). Creating a desktop...

Windows Operating System History & Versions

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

Hotmail [Outlook] Email Accounts

By Vangie Beal Hotmail was one of the first public webmail services that could be accessed from any web browser. Since 2011, Hotmail, in terms...

IT Observability Definition &...

IT observability is the theory that a system's internal state should be understood...

Data Corruption Definition &...

Data corruption is the process of data becoming unreadable or invalid. It typically...

Subschema Definition & Meaning

A subschema is a database view that filters or organizes all data to...