File System Cryptography

Table 4-27 shows the summary information for file system cryptography.

Table 4-27. File System Cryptography

Name

File system cryptography

Common example

Microsoft's Encrypting File System (EFS)

Attack elements detected

Attack elements prevented

Identity spoofing Direct access Rootkit

Remote control software

Difficulty in attacker bypass

4

Ease of network implementation

5

User impact

3

Application transparency

4

Maturity of technology

3

Ease of management

4

Performance

4

Scalability

4

Financial affordability

4

Overall value of technology

91

Although not an integrated component of network security, file system cryptography is overlooked enough that it should be addressed here. The idea is simple: file system cryptography encrypts either the entire file system of a host or sensitive directories in that file system. The big rush toward network security has been predicated on the assumption that servers have all the juicy information.

Although it is certainly true that servers are critical resources in need of protection, stealing a portable computer can provide an attacker equally sensitive information with a lot less effort. File system security should be done in most situations where it is viable. This generally means mobile user

4 PREV

NEXT t

Was this article helpful?

0 0
Advance SEO Techniques

Advance SEO Techniques

Turbocharge Your Traffic And Profits On Auto-Pilot. Would you like to watch visitors flood into your websites by the 1,000s, without expensive advertising or promotions? The fact is, there ARE people with websites doing exactly that right now. How is that possible, you ask? The answer is Advanced SEO Techniques.

Get My Free Ebook


Post a comment