What is BitLocker?
This question marks its way back to the time when people used to rely on the security of windows login credentials. The security no doubt prevented users from having access to one’s personal computer, but once a person had logged into the system, he/she would have the access to basically anything and everything that came their way.
BitLocker is a windows 10 integrated software that lets you encrypt your hard drive(s). The drives are encrypted with 128-bit or 256-bit encryption; this adds up a high level of security to your data even if your computer is stolen or misplaced. BitLocker is particularly useful for people who would like to ensure the safety of their data even if someone is able to have an access to the PC’s login credentials.
…show more content…
What is TPM?
TPM or Trusted Platform Module is a microprocessor that has the ability to store credentials or artifacts used to authenticate the platform.
Each Trusted Platform Module consists of a n RSA key paid called the EK or the Endorsement Key. The EK is stored inside the chip and there is no way of accessing it with the use of Software. The ownership of a system is endorsed by the Storage Root Key, which is generated based on the Endorsement Key and an owner-specified password.
These keys along with a secondary key, known as Attestation Identity Key ensure the safety of a PC by matching these keys and allowing or restricting the access to the network based on their authentication. BitLocker can use this technology to protect the encryption of the hard disk, that too using the keys mentioned above.
However, there is no need for the use of TPM and below is the procedure of excluding the need for TMP with just a simple change in Windows 10:
Step 1:
Hold down the Windows Key and Press the “R” key on the keyboard. This will prompt the RUN window, type “gpedit.msc” in the text field and Click
OK. Step 2: After entering the command and click “OK”, a new window will appear. Select “Computer Configuration >> Administrative Templates >> Windows Components >> BitLocker Drive Encryption >> Operating System Drives” Step 3 Double click the “Require additional authentication at startup (Windows Server 2008 and Windows Vista)”. Once done, Click OK. Step 4 Now you need to activate BitLocker. You can do so by right click on C: Drive and selecting “Turn on BitLocker” Follow the self-explanatory wizard and tick “Use a password to unlock the drive”. “Choose Encrypt Disk Space” and click Start. Step 5 When you restart your computer you would be required to enter the password that you had chosen as your password while setting up BitLocker. If you require any further assistant in setting up your BitLocker or any other aspect of data security, you simply have to contact us and we will guide you through the detailed procedure.
-the number of proxy’s online is hard to count, thus making it difficult to tell the difference between the good and bad, there are some proxy set up by hacker to fish out information of the user while the person uses the
This type of encryption key administration is to create an extra key for decoding the data and is kept secure in escrow by an authorised 3rd party. We can also call this as a backup key or split-key. This kind of encryption method is been using to recover the data if a user forgot the password.
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
The Trusted Platform Module may be deployed in the form of hardware or as software component on a system that contains RSA encryption keys detailed to ...
It ensures security and helps safeguard access to user data and applications while compiling with user demand for a safe and secure sign-in process.
... Temporal Key Integrity Protocol (TKIP) to wrap in WEP encryption techniques and advanced security to overcome most of its weaknesses. That is why data privacy is possible with the help of WPA security.
Hypervisor is also known as virtual machine monitor (VMM). The VMM is a thin software layer that runs directly on a physical machine’s hardware. On top of the virtual machine monitor, there can be one or more virtual machines. The VMM provides each virtual machine with a set of virtual interfaces that resemble direct interfaces to the underlying hardware. Applications on a virtual machine can run without modification as if they were on running on a dedicated physical machine. The
BitLocker™ Drive Encryption is a proprietary cryptography tool designed by Microsoft to provide enhanced data protection through
...M and the US National Security Agency. It was previously the most dominant type of encryption, but it is now being taken over by AES (Advanced Encryption Standard). Since data encryption standard, only took on a 56-bit symmetric key encryption, AES uses three key sizes, 128, 192, and 256 bits. When personal computer users want to encrypt email or other documents, they go to Phillip Zimmerman?s "Pretty Good Privacy" software. This software allows you to digitally sign a message, which verifies to the recipient that you are the sender and that no interfering is involved.
ISO/IEC 9798, Information Technology - Security Tech- niques - Entity Authentication. Part 1, General. Part 2, Mechanisms Using Encipherment Algorithms. Part 3, Mechanisms Using a Public-Key Algorithm, Int’l Orga- nization for Standarization, Geneva, 1997.
To achieve the functionality of cryptography in any programming language is a tedious task. It can now achieved easily through microsoft dot net framework.Earlier you have design the algorithm ,set the key and use the existing library to implement the process. The library covers various symmetric,unsymmetric and hash functions. A set of cryptographic tools is important in software industry. Cryptography ensures confidentiality of data being exchanged, but it also prevents attacks that a hacker could plan once the person knows internal architecture of the system.The cryptography allows secure communication of information between two entities.
Firewall: Firewalls are an essential component in protecting your personal data and information. Most good anti-virus suites include a firewall that limits access to your computer. Windows includes a personal firewall that is reliable - as long as it 's enabled. Therefore, always ensure that you have a firewall application active on your computer to keep hackers and intruders from simply viewing or downloading documents on your PC.
Rayne, PB, Kulkarni, P, Patil, S & Meshram, BB 2012, ‘Authentication and Authorization:Tool for Ecommerce Security’, Engineering Science and Technology: An International Journal, vol. 2, no. 1, pp. 150-157.
Windows Millennium Edition contains high encryption by default. To obtain high encryption support for Windows 2000, please visit Windows Update at http://www.windowsupdate.microsoft.com/ or http://www.microsoft.com/windows2000/downloads/recommended/ encryption/default.asp. Installing or upgrading the Windows Desktop Update (Windows NT 4.0 only) ------------------------------------------------------------- If you have already installed Internet Explorer 6 and would like to install the Windows Desktop Update, you must install Internet
Users can access all files of the operating system in the File explorer. Files can be found in any drive and shown to the user.