Solved

encryption on machine

Posted on 2016-08-25
7
81 Views
Last Modified: 2016-08-25
what are benefits for encryption to run on machine? is it only applicable that someone does not read data without the encryption password.. so basically 2 layers of protection? (windows password, and encryption password)

could this affect performance windows programs?
would encryption happen only on writes? (continually)

considering if this is something to consider for a laptop that will be on road..

what could be disadvantages? like potential slowness on less resource machine etc?
0
Comment
Question by:25112
7 Comments
 
LVL 93

Assisted Solution

by:John Hurst
John Hurst earned 125 total points
ID: 41770252
On a modern laptop, encryption does not hinder performance. The value, for a laptop on the road, is that the data is secure if the laptop is lost or stolen. That is the major benefit.
0
 
LVL 29

Assisted Solution

by:ScottCha
ScottCha earned 125 total points
ID: 41770258
The benefits are that if the machine is lost or stolen or otherwise compromised, the data on the drive cannot be accessed.

This is definitely something you want on a laptop that is on the road.  Especially if sensitive customer data is on the machine.  This will protect the customer as well as yourself from possible legal action.

With the speed of systems now, you won't see much if any performance hit.  

Use BitLocker....comes with Microsoft Windows 10 Pro.
0
 
LVL 5

Author Comment

by:25112
ID: 41770372
BitLocker
is that all it does? encrypt on write?
does read do a decrypt moment by moment too? or is only WRITE involved with the BitLocker tool?

does this have to do anything to do with backups? (scheduled or on-demand) {or put in another way, does this interfere with backups in anyways)
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 93

Assisted Solution

by:John Hurst
John Hurst earned 125 total points
ID: 41770379
BitLocker encrypts on write and decrypts on read as it go.

Any backup has to be integrated with BitLocker.
0
 
LVL 62

Accepted Solution

by:
btan earned 250 total points
ID: 41770533
Encryption is two layer whereby you protect the at disk level and file/folder level.
- Disk level: in event the HDD is stolen or lose (but cannot boot up w/o the password) - like Bitlocker
- File/Folder (or container) level: in event the of unauthorised login that bypass the disk but file/folder of user files remains encrypted. Like EFS or Veracrypt (container)

There is definitely additional resource to performance encryption but it is minimal impact with computing power and faster disk such as Solid State and event then there is no real experience of slowness using the traditional SATA, IDE or RAID. The more secure (longer key length), the more resource btu so far, on the fly access of the encrypted file are optimal and acceptable.

Con is to ensure recovery and backup is done and verified working. You be surprised one day you forget password and not able to recover or found those expected key to be corrupted. Part and parcel of using crypto and PKI..but it make you feel more assure with data encrypted. Some wanted portable encrypted container and run from any machine - that can be done provider you have admin right but this not quite impactful if you using your own machine most of the time.
0
 
LVL 5

Author Comment

by:25112
ID: 41770791
thankuexperts..
0
 
LVL 93

Expert Comment

by:John Hurst
ID: 41770796
You are very welcome and I was happy to help.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question