Solved

BITLOCKER SECURITY.

Posted on 2014-11-17
7
171 Views
Last Modified: 2014-11-18
I now am using bitlocker. I want to know an expert's opinion of how secure it is. I am NOT worried about a "professional" hacker, only people that have some knowledge of computers. Am I safe from a knowledgable computer person that wants to get into my drive or would that take a high level hacker?
0
Comment
Question by:Need-a-Clue
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 19

Assisted Solution

by:*** Hopeleonie ***
*** Hopeleonie *** earned 75 total points
ID: 40449082
Bitlocker is more secure if you have a TPM chip. We use Bitlocker on our company and it is very safe.

More info:
http://technet.microsoft.com/en-us/library/cc732774.aspx
0
 
LVL 3

Assisted Solution

by:Matt D
Matt D earned 100 total points
ID: 40449137
To secure Bitlocker requires the use of a TPM, configured with Safe Boot to prevent unauthorized boot media.  

Windows 8 OS's with UEFI and TrustedBoot can further secure the boot process.

Group / Local policy can be used to lock down settings and configure the storage of encryption keys.
0
 
LVL 54

Accepted Solution

by:
McKnife earned 325 total points
ID: 40449163
"people that have some knowledge of computers" have no chance to get in. Only if you see yourself as the target of some professional, you would need to start worrying - then we would have to look at what type of key you are using.
0
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

 

Author Closing Comment

by:Need-a-Clue
ID: 40449779
EXPERTS, thanks so much for your valuable advice!
McKnife, your comment was exactly what I was hoping to hear. The key I am using is over 25 characters using letters and numbers.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40449800
One thing: this is a password that you use for preboot authentication? Or do you mount a data volume while windows is already running? Preboot authentication is recommended.
0
 

Author Comment

by:Need-a-Clue
ID: 40449840
I only know how to do it one way. I am NOT well versed in Bitlocker. When windows is running I hook up the external drive that I need protection on. As soon as windows recognizes that the drive has been added it tells me that it needs the bitlocker p/w. I enter the p/w and I am into the external drive.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40449870
It should be noted that while windows is booted, keyloggers could record the password.
However, possible attackers would need to install that keylogger, first.
0

Featured Post

Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sophos Email Encryption works for some people and not for others. 6 90
Encryption Decryption in Oracle 12 163
Guide on using PGP email encryption 4 85
Windows 10 BitLocker 3 79
As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question