

So if a laptop is stolen while it is running but unattended (or while the user is distracted), the data will be fully accessible to the thief. Full disk encryption only protects data when the computer is turned off. Theft of the laptop while it is running.

Users can also be fooled into revealing their password through social engineering. When users store a USB drive containing the encryption key along with a computer, accessing the encryption key becomes trivial for a thief. No security system is 100 percent secure, and whole disk encryption can be vulnerable to various attacks including: For that reason you may want to consider deploying FLE in conjunction with full disk encryption, so that users have the option to manually encrypt files that need to be shared with others. And FLE generally depends on the user to perform some action to ensure that files are encrypted before storage.Ī drawback of whole encryption, however, is that it does nothing to protect files “in motion.” Once a file is sent via email or copied to a memory stick, it is no longer encrypted. In contrast, FLE only protects specific files that are manually encrypted. File Level Encryptionįull disk encryption differs from file level encryption (FLE) in that it secures all data stored on your hard drives automatically and transparently – including swap files and hidden files that may contain confidential data – without any user intervention. Without the encryption key, the data stored on the disk remains inaccessible to thieves and hackers. or using a biometric device such as a fingerprint reader (usually connected to a Trusted Platform Module which holds the actual encryption key)Ī combination of two or more of these methods can be used to create multifactor authentication, for greater encryption strength and added security.Īs information is read from the disk that is protected by full disk encryption, it is decrypted on the fly and stored in memory – and any information written to the disk is also encrypted on the fly.using a one-time password-generating device such as an RSA token.by inserting a USB drive containing the encryption key.in the form of a password or passphrase.Most full disk encryption products allow users to provide the system’s encryption key at the pre-boot stage in several ways: See our guides to the top enterprise encryption vendors and the top full disk encryption products When the system is started, the user is prompted for the encryption key, which enables the system to decrypt enough to boot and run normally. How Full Disk Encryption WorksįDE works by encrypting a system’s entire hard drive – all the confidential data stored on it, but also the operating system and all applications. Full disk encryption – also known as whole encryption – is the most effective way to prevent confidential data being taken from a laptop that has been lost, stolen or left unattended in a hotel room.
