Full-disk encryption (FDE) is a security method for protecting sensitive data at the hardware level byencrypting all data on adisk drive. FDE automatically encrypts data and operating systems (OSes) to prevent unauthorized access.
Disk-level encryption safeguards data from getting into the wrong hands and is important for organizations that are following data security compliance regulations such as the Health Insurance Portability and Accountability Act or theGeneral Data Protection Regulation.
FDE is especially useful for desktops, laptops and mobile devices that can be physically lost or stolen. Even if the device is stolen, the encrypted data will be inaccessible to the thief. Because onekey is used to encrypt the entire hard drive, FDE requires network administrators to enforce a strong password policy and provide an encryption key backup process in case employees forget their password or leave the company unexpectedly.
FDE works by automatically converting data on a hard drive into a format that can't be understood by anyone who doesn't have the key to undo the conversion. Specifically, the hard drive is converted from a readable plaintext to aciphertext that isn't readable unless it's converted back to plaintext with a key. Without the proper authentication key, even if the hard drive is removed and placed in another machine, the data remains inaccessible. The encryption process is performed using encryption software or hardware that's installed on the drive. Some systems don't encrypt the master boot record -- the code that starts the OS loading sequence -- meaning that not everything on those devices is encrypted.
FDE is often installed on computing devices at the time of manufacturing. For example, FDE isenabled through features likeBitLocker, which is included in certain Microsoft Windows versions, or FileVault, which is built into the macOS. BitLocker and FileVault enable users to recover lost passwords. BitLocker stores recovery information on Active Directory, and FileVault backs up encryption keys to AppleiCloud. Microsoft also offers Device Encryption on all Windows devices that protects data by encrypting the drive.
Full-disk encryption offers the following advantages:
Some disadvantages of FDE, however, include the following:
Learn more aboutcentralized encryption methods in IT environments and how they're critical to preventing data theft.
Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles to ensure business continuity and the availability of effective leadership in the face of role transitions, departures or unforeseen events. See More.
Multi-access edge computing (MEC) is a network architecture concept that brings cloud computing capabilities and IT services ...
Fifth-generation wireless or 5G is a global standard and technology for wireless and telecommunications networks.
A small cell is a type of low-power cellular radio access point or base station that provides wireless service within a limited ...
No longer just a good idea, IAM is a crucial piece of the cybersecurity puzzle. It's how an organization regulates access to ...
Data masking is a security technique that modifies sensitive data in a data set so it can be used safely in a non-production ...
Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other ...
A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...
User-generated content (UGC) is published information that an unpaid contributor provides to a website.
Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...
Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...
Compensation management is the discipline and process for determining employees' appropriate pay, incentives, rewards, bonuses ...
HR technology (human resources tech) refers to the hardware and software that support an organization's human resource management...
A virtual agent is an AI-powered software application or service that interacts with humans or other digital systems in a ...
Customer acquisition cost (CAC) is the cost associated with convincing a consumer to buy your product or service, including ...
Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or ...
