Full Disk Encryption

Full disk encryption translates data into a code, shielding it from anyone who doesn’t have the corresponding key to decode it. Full disk encryption allows users to secure all the data stored on a device. It encrypts the whole hard drive as well as the data that needs to be protected. When the user turns on their computer’s operating system, they’ll enter one or more factors of authentication before their data can be decrypted.

Today, most data storage systems use a more secure form of encryption called asymmetric cryptography. This is also known as public-key cryptography, because data can be encrypted using a public key but requires a private one to be decrypted. Asymmetric cryptography makes it much more difficult for anyone but the authorized person to decrypt the data because it uses advanced mathematical keys for the decryption.

Disk vs. File Encryption

One advantage of disk encryption is the longevity of the process: a hard disk or solid-state drive will hold data securely while the computer is turned off or if it shuts down unexpectedly. Main memory or RAM, on the other hand, will only hold data that’s actively in use on the operating system or device. Although it’s slower, a disk drive will store data after the operating system or device shuts down or loses power. Full disk encryption won’t keep transferred or sent data encrypted if you email data, send it over a network, or transfer it to a new storage device, but if you pair it with file-level encryption (FLE), you can manually encrypt any data that you need to send.

File encryption requires more time and effort because it doesn’t cover an entire hard drive automatically. But it’s helpful because it allows users to specifically choose which files to encrypt and then send those files to others, thus protecting the data during transit. Before the user stores their data, file level encryption also may require them to complete further tasks.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Embedded Analytics

Embedded analytics brings self-service business intelligence to everyday application users.

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their workforce operations. They provide a central platform for human resources professionals...

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...