Ways of Locking down Your System

16/12/2020

Ways of Locking down Your System

Users often leave files unencrypted and generally only use a login password.

Unless a form of Encryption is enabled this is a weak attempt at protecting your data.

Any IT Windows or Linux administrator will have sufficient knowledge to gain access to your files with or without your login password.


Full Disk Encryption

Full Disk Encryption or FDE is a sure way of protecting your information when the computer has been switched off. Usually, computers employ Pre-Boot Authentication. A prompt is displayed before the computer is allowed to boot, prompting the user to enter their password or passphrase to decrypt the drive and allow the system to boot.

Power On Authentication

A system that is available on most laptops and PCs but the effectiveness depends on how the process works and if the password can be reset by resetting or reflashing the BIOS.

File-Based Encryption

File-Based Encryption or FBE keeps the information encrypted during the system’s operation and the files are only decrypted when accessed. The drive usually has a time out feature that re-encrypts the file after a set amount of time or removes the decryption key from the cache, therefore, rendering the file unreadable, until the next time the file is accessed. If the file is removed from the computer it will not be able to be read until the decryption keys and or software is installed on that machine.

GPS FDE + FBE

GPS Full Disk Encryption + File-Based Encryption this is an ultra-secure lock. Not only is the drive encrypted at boot and the important files remain encrypted during the system’s operation. The decryption key is based upon the device’s location. The sort of encryption is best for stationary computers that do not move. If the device is moved even an inch, the encryption key changes as it’s based upon the X+Y location of the unit.

Biometric Verification

Fingerprint Access and Facial Login isn’t usually recommended as a primary way of accessing your system as these measures have no duress leeway. With a password, you have the ability to enter the details wrongly or your ability to forget the details. Your unable to misremember your fingerprint nor your face….without some form of skin dissolving acid.

RELATED POST

Easy to Customize
2/08/2021

Mobile App Scanner to Find Security Vulnerabilities

Mobile usage is growing, so Mobile Apps. There are around 2 million apps on Apple App Store and 2.5 on Google Play. The latest research shows that 38% of iOS and 43% of Android APP had high-risk vulnerabilities.

22/02/2021

Distributing Services – Kubernetes

Note: Everything here applies to Google Kubernetes Engine. If you are running [more]

20/02/2021

Resolve EventLog Error 10016

I understand your frustration. I recently just fixed some 10016 errors only [more]

  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/2addicted.mp3
  • https://ackerworx.uk//d/2addicted.mp3
  • Bad Wings
  • The Glitch Mob
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/BW.mp3
  • https://ackerworx.uk//d/BW.mp3
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/addicted.mp3
  • https://ackerworx.uk//d/addicted.mp3
  • Ryder Remix
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/bw2.mp3
  • https://ackerworx.uk//d/bw2.mp3