Sunday, February 2, 2014

The Role of File Encryption in Computer and Network Security- By Daniel Gail


File encryption plays an important role in computer and network security. While other security products block computer viruses, detect intrusions, back up data, physically secure devices, or clean up threats, file encryption renders your most sensitive information unreadable should a hacker or data thief get past your frontline defenses. File encryption works by encoding and decoding files. In order to use an encrypted file, you must have a means of decoding it. This means is often in the form of a "key" such as a password, trusted certificate, or biometric reader.

Types of Encryption
Many types of encryption exist. Below are a few of the more common forms of them used in computer and network security:
File-level - With file-level encryption, files are encrypted on a case-by-case basis. For example, you may opt to encrypt files with sensitive financial information while leaving less critical files unencrypted. While using this software as needed offers some protection, this method relies on users remembering to use the software. If they forget to encrypt an important file, that file is vulnerable.
Application-level - Some applications, including Microsoft Office, include file encryption tools. However, application level encryption usually requires the user to initiate encryption. For example, Adobe Acrobat Pro offers four levels of security (no security, password security, certificate security, and Adobe LifeCycle Rights Management), but users must make a choice each time they create a new file. By default, "no security" is selected.
Database - Database encryption is also an option. Depending on the database software, it may even be built in. If not, third party encryption software can be placed between the application and the database to encrypt and decrypt data as it is written to the database or retrieved.
Email - Email messages leave your network, travel across the Internet, and land in recipients' inboxes. Once you hit "send," your messages and any file attachments are beyond your control. Fortunately, you can encrypt email messages. Common email encryption types include PGP (Pretty Good Privacy) and S/MIME which uses trusted certificates.
Network - File encryption over a network is one of the most important areas of computer and network security. Common encryption methods include Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Secure Shell (SSH). Wireless networks use Wired Equivalent Privacy (WEP) and WiFi Protected Access (WPA).
Hard disk - With hard disk encryption, file encryption is done across the entire hard disk. Users do not need to remember to encrypt individual files as the disk itself is encrypted. The process is generally seamless for users. Once set up and encrypted, the only intervention required is logging on to the hard disk with the appropriate key. This is usually accomplished by entering a password or using fingerprint authentication. Once unlocked, the data on the disk is readily accessible by the user.
It's an important computer and network security measure that can protect individual files or an entire hard disk's worth of files from falling into the wrong hands.
Daniel Gail is an author and expert in network security. He has helped a countless number of companies secure their networks and computers by recommending a great network encryption solution named SecureDoc from WinMagic.


Article Source: http://EzineArticles.com/8193701

No comments:

Post a Comment