Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/SSD) vendors, including: Hitachi, Integral Memory, iStorage Limited...
15 KB (1,788 words) - 05:38, 5 March 2025
people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. It is used...
17 KB (2,192 words) - 13:07, 24 July 2025
Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically...
15 KB (1,251 words) - 08:41, 27 May 2025
Encrypted filesystem (redirect from Filesystem encryption)
disk or disk volume Disk encryption hardware Disk encryption software Hardware-based full disk encryption This disambiguation page lists articles associated...
495 bytes (95 words) - 13:27, 19 June 2016
Data security (section Disk encryption)
either software (see disk encryption software) or hardware (see disk encryption hardware) which can be used together. Disk encryption is often referred to...
13 KB (1,399 words) - 16:48, 13 July 2025
Encrypting File System (redirect from NTFS encryption)
encryption Disk encryption software eCryptfs EncFS Filesystem-level encryption Hardware-based full disk encryption "File Encryption (Windows)". Microsoft...
25 KB (3,061 words) - 03:56, 8 April 2024
transparent data encryption keys for databases and keys for storage devices such as disk or tape.[citation needed] Some HSM systems are also hardware cryptographic...
14 KB (1,557 words) - 08:50, 19 May 2025
Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]), is a specification for the encryption of electronic...
50 KB (5,679 words) - 04:23, 27 July 2025
Evil maid attack (section Full disk encryption systems)
attacker to exploit the device. Many full disk encryption systems, such as TrueCrypt and PGP Whole Disk Encryption, are susceptible to evil maid attacks...
15 KB (1,715 words) - 21:03, 18 October 2024
This is a technical feature comparison of different disk encryption software. Hidden containers: Whether hidden containers (an encrypted container (A)...
70 KB (2,842 words) - 09:05, 27 May 2025
Data in use (section Full memory encryption)
Example privacy-enhancing technologies M. Henson and S. Taylor "Beyond full disk encryption:protection on security-enhanced commodity processors", "Proceedings...
7 KB (894 words) - 09:28, 5 July 2025
Cold boot attack (redirect from Full memory encryption)
finding attacks. Since cold boot attacks target random-access memory, full disk encryption schemes, even with a trusted platform module installed are ineffective...
38 KB (4,279 words) - 20:59, 14 July 2025
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can...
34 KB (3,645 words) - 19:23, 28 July 2025
Data erasure (redirect from Disk wipe)
a disk for routine erasure, providing a hacking protection method that is less time-consuming than software encryption. Hardware/firmware encryption built...
31 KB (3,092 words) - 04:56, 16 July 2025
BitLocker (redirect from Bitlocker Drive Encryption)
BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing...
37 KB (3,534 words) - 03:51, 24 April 2025
Encrypting File System Filesystem-level encryption Disk encryption hardware Hardware-based full disk encryption Personal data General Data Protection Regulation...
18 KB (1,725 words) - 16:02, 28 July 2025
USB flash drive (redirect from Disk on key)
incorporate hardware-based copy protection directly into the drive's design, eliminating the need for third-party software. Unlike software-based encryption systems...
83 KB (9,327 words) - 19:42, 22 July 2025
extremely difficult . Active packaging Chicago Tylenol murders Hardware-based full disk encryption Ink tag Intelligent banknote neutralisation system § Dye...
18 KB (2,310 words) - 19:59, 28 July 2025
Windows 2000 (section Basic and dynamic disk storage)
as part of Windows 2000; this introduced disk quotas (provided by QuotaAdvisor), file-system-level encryption, sparse files and reparse points. Sparse...
123 KB (12,025 words) - 17:18, 25 July 2025
authentication. Full disk encryption outside of the operating system level Encryption of temporary files Data at rest protection Encryption of cloud servers...
6 KB (628 words) - 11:00, 14 October 2024
Linear Tape-Open (category Tape-based computer storage)
the cost of the hardware that makes use of and manages the media and the cost of the power to run it all. As HDD prices have dropped, disk has become cheaper...
72 KB (6,283 words) - 15:41, 3 August 2025
Pretty Good Privacy (redirect from Pgp encryption)
digital signatures, full disk encryption, file and folder security, protection for IM sessions, batch file transfer encryption, and protection for files...
57 KB (6,276 words) - 02:52, 30 July 2025
Computer data storage (redirect from Data retention hardware)
volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices. Hardware memory encryption is available in...
57 KB (6,541 words) - 15:59, 26 July 2025
TrueCrypt (category Disk encryption)
source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, encrypt a partition, or encrypt...
66 KB (6,485 words) - 13:33, 15 May 2025
VeraCrypt (category Disk encryption)
utility for on-the-fly encryption (OTFE). The software can create a virtual encrypted disk that works just like a regular disk but within a file. It can...
38 KB (3,218 words) - 13:02, 5 July 2025
Solid-state drive (redirect from Solid state disk)
reliable disk drives or CD-ROMs. Appliances built this way can provide an inexpensive alternative to expensive router and firewall hardware.[citation...
127 KB (11,151 words) - 15:06, 16 July 2025
NetApp FAS (section NetApp Storage Encryption)
feature. NetApp Storage Encryption (NSE) is using specialized purpose build disks with low level Hardware-based full disk encryption (FDE/SED) feature and...
43 KB (4,383 words) - 15:57, 1 May 2025
Virtualization (redirect from Hardware-assisted virtualization)
operating system; Windows-based software can be run on the virtual machine. Different types of hardware virtualization include: Full virtualization – Almost...
37 KB (4,243 words) - 10:52, 3 July 2025
Block cipher mode of operation (redirect from Encryption mode)
and XTS) and wide-block encryption modes (CMC and EME) are designed to securely encrypt sectors of a disk (see disk encryption theory). Many modes use...
52 KB (5,830 words) - 02:15, 29 July 2025
Macrium Reflect (category Disk image emulators)
Data is compressed and encrypted in real time using LZ-based compression and AES encryption algorithms. Images can be mounted as a drive letter in Windows...
14 KB (1,398 words) - 10:31, 25 July 2025