Section 20.196 Data Encryption Levels Flashcards
Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
Data Encryption
Process of converting data into a secret code to prevent unauthorised access
Data Encryption Levels
Full-disk
Encrypts the entire hard drive to protect all of the data being stored on it
Partition
Similar to full-disk encryption but it is only applied to a specific partition
on the storage device
VeraCrypt: Tool that selectively encrypts partitions, like sensitive documents,
while leaving the OS partition unencrypted
Volume
Used to encrypt a set space on the storage medium
Creates an encrypted container that can house vario
File-level Encryption
Used to encrypt an individual file instead of an entire partition or an
entire disk drive
GNU Privacy Guard: A tool that provides cryptographic privacy and authentication for data communication
Database
● Secures the entire database
● Can extend the encryption across multiple storage devices or cloud storage
● Similar to full-disk encryption
Record
Encrypts individual records or rows within a database