Cryptography in Operating Systems
With increased use of laptops, third-party data centers, and hard drive backup storage, it has become clear that protecting data “in flight” should include protecting that data in storage on the operating system.
Over the years, this has seen a number of developments in encryption technologies, leading to the widespread deployment of cryptography within most enterprises.
File and folder encryption
The first application of encryption to stored data was that of file and folder encryption. In many cases, this encryption is carried out in a rather manual and ad hoc manner—running an application to encrypt a file, then running the companion decryption application when the file was needed to be edited. For folders, ...
Get Eleventh Hour Security+ now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.