The pros and cons of elliptic curve cryptography

Disk Encryption and File Encryption

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Finding affordable encryption options for laptop data security

    This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and ... 

  • Data encryption best practices

    Ever since Bank of America disclosed in 2005 that it lost a backup tape with customers’ personal data, nearly 80 other companies have reported similar embarrassing mishaps. These data breaches and new regulatory mandates are fueling the exploding int... 

  • Best of encryption products 2013

    Readers vote on the top encryption products in 2013: full drive encryption, mobile storage, certificate management and secure communications. 

  • Choosing security products: DLP technology

    Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. 

  • Quiz: Demystifying data encryption

    A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School. 

  • Locking down database applications

    In this lesson, learn how to secure database apps by building roles and privileges and monitoring access to prevent insider abuse, plus satisfy regulators by properly segregating duties and limiting application access to sensitive database data. 

  • Data encryption demystified

    Five years ago, security professionals needed a deep understanding of cryptography to make encryption work. Today, thanks to advancements in "practical" cryptography, data encryption is more user-friendly, and easier to implement and manage across mu... 

  • Quiz: Storage security

    Regulations like SOX and the recently approved Personal Data Privacy and Security Act are bringing the importance of data protection to light. Loss of data – be it inadvertent or surreptitious -- can result in fines, loss of revenue and loss of... 

  • PING with Karen Worstell

    The Microsoft CISO discusses how she keeps Redmond and its products secure. 

  • Life at the edge part 3: Resistance to failure

    Learn how architecture, protocol and application-level protections work together to safeguard a Web infrastructure. 

  • How to address SAN architecture security weaknesses

    SAN technology has burst out of the data center, exposing the world to SAN architecture security weaknesses. 

  • cold boot attack

    A cold boot attack is a process for obtaining unauthorized access to encryption keys stored in the dynamic random access memory (DRAM) chips of a computer system. 

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil maid attack is characterized by the attacker's ability to physically access the target multiple times without the owner's ... 

  • homomorphic encryption

    Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form.  Homomorphic encryptions allow complex mathematical operations to be performed on encrypted data without c... 

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is an encryption algorithm for securing sensitive but unclassified material by U.S. Government agencies and, as a likely consequence, may eventually become the de facto encryption standard for commercial transac... 

  • Twofish

    Twofish is an encryption algorithm based on an earlier algorithm, Blowfish, and was a finalist for a NIST Advanced Encryption Standard (AES) algorithm to replace the DES algorithm. 

  • network encryption (network layer or network level encryption)

    Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level. 

  • Escrowed Encryption Standard (EES)

    The Escrowed Encryption Standard (EES) is a standard for encrypted communications that was approved by the U.S. Department of Commerce in 1994 and is better known by the name of an implementation called the Clipper chip. 

  • Encrypting File System (EFS)

    The Encrypting File System (EFS) is a feature of the Windows 2000 operating system that lets any file or folder be stored in encrypted form and decrypted only by an individual user and an authorized recovery agent. 

  • data key

    In cryptography, a data key is a key (a variable value that is applied to a string or block of text to encrypt or decrypt it) that is used to encrypt or decrypt data only and is not used to encrypt or decrypt other keys, as some encryption formulas c... 

  • Rijndael

    Rijndael (pronounced rain-dahl) is the algorithm that has been selected by the U.S. National Institute of Standards and Technology (NIST) as the candidate for the Advanced Encryption Standard (AES). 

  • See more Definitions on Disk Encryption and File Encryption
About Disk Encryption and File Encryption

Encrypting data at rest, whether at the file level or the disk level, can be a valuable tactic in the fight against hackers. Get advice on how to secure your organization's data with full, hard and whole disk encryption, and how to encrypt files with file encryption tools and software.