Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Androidâ„¢ device!
Free
Faster access than browser!
 

Disk encryption software

Index Disk encryption software

Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption. [1]

34 relations: Alex Halderman, BestCrypt, BitLocker, Cold boot attack, Comparison of disk encryption software, Computer security, Crypto-shredding, Darik's Boot and Nuke, Data remanence, Device driver, Disk encryption, Disk encryption hardware, Disk encryption theory, Dynamic random-access memory, File system, FileVault, FreeOTFE, In re Boucher, Key (cryptography), Laptop, Mihir Bellare, Mount (computing), Operating system, Phillip Rogaway, Plausible deniability, Pseudorandom permutation, Single sign-on, Sparse file, Steganography, Symmetric-key algorithm, TrueCrypt, USB flash drive, VeraCrypt, Volume (computing).

Alex Halderman

J.

New!!: Disk encryption software and Alex Halderman · See more »

BestCrypt

BestCrypt is a commercial disk encryption app for Windows, Linux and OS X, developed by Jetico Inc, Oy.

New!!: Disk encryption software and BestCrypt · See more »

BitLocker

BitLocker is a full disk encryption feature included with Windows Vista and later.

New!!: Disk encryption software and BitLocker · See more »

Cold boot attack

In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine.

New!!: Disk encryption software and Cold boot attack · See more »

Comparison of disk encryption software

This is a technical feature comparison of different disk encryption software.

New!!: Disk encryption software and Comparison of disk encryption software · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Disk encryption software and Computer security · See more »

Crypto-shredding

Crypto-shredding is the practice of 'deleting' data by deliberately deleting or overwriting the encryption keys.

New!!: Disk encryption software and Crypto-shredding · See more »

Darik's Boot and Nuke

Darik's Boot and Nuke, also known as DBAN, is an open source project hosted on SourceForge.

New!!: Disk encryption software and Darik's Boot and Nuke · See more »

Data remanence

Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase the data.

New!!: Disk encryption software and Data remanence · See more »

Device driver

In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer.

New!!: Disk encryption software and Device driver · See more »

Disk encryption

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

New!!: Disk encryption software and Disk encryption · See more »

Disk encryption hardware

The computer security technique called disk encryption is used to protect confidentiality of the data stored on a computer disk.

New!!: Disk encryption software and Disk encryption hardware · See more »

Disk encryption theory

Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk).

New!!: Disk encryption software and Disk encryption theory · See more »

Dynamic random-access memory

Dynamic random-access memory (DRAM) is a type of random access semiconductor memory that stores each bit of data in a separate tiny capacitor within an integrated circuit.

New!!: Disk encryption software and Dynamic random-access memory · See more »

File system

In computing, a file system or filesystem controls how data is stored and retrieved.

New!!: Disk encryption software and File system · See more »

FileVault

FileVault is a disk encryption program in Mac OS X 10.3 and later.

New!!: Disk encryption software and FileVault · See more »

FreeOTFE

FreeOTFE is a discontinued open source computer program for on-the-fly disk encryption (OTFE).

New!!: Disk encryption software and FreeOTFE · See more »

In re Boucher

In re Boucher (case citation: No. 2:06-mJ-91, 2009 WL 424718), is a federal criminal case in Vermont, which was the first to directly address the question of whether investigators can compel a suspect to reveal their encryption passphrase or password, despite the U.S. Constitution's Fifth Amendment protection against self-incrimination.

New!!: Disk encryption software and In re Boucher · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Disk encryption software and Key (cryptography) · See more »

Laptop

A laptop, also called a notebook computer or just notebook, is a small, portable personal computer with a "clamshell" form factor, having, typically, a thin LCD or LED computer screen mounted on the inside of the upper lid of the "clamshell" and an alphanumeric keyboard on the inside of the lower lid.

New!!: Disk encryption software and Laptop · See more »

Mihir Bellare

Mihir Bellare is a cryptographer and professor at the University of California San Diego.

New!!: Disk encryption software and Mihir Bellare · See more »

Mount (computing)

Mounting is a process by which the operating system makes files and directories on a storage device (such as hard drive, CD-ROM, or network share) available for user to access via the computer's file system.

New!!: Disk encryption software and Mount (computing) · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Disk encryption software and Operating system · See more »

Phillip Rogaway

Phillip Rogaway is a professor of computer science at the University of California, Davis.

New!!: Disk encryption software and Phillip Rogaway · See more »

Plausible deniability

Plausible deniability is the ability of people (typically senior officials in a formal or informal chain of command) to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.

New!!: Disk encryption software and Plausible deniability · See more »

Pseudorandom permutation

In cryptography, a pseudorandom permutation (PRP) is a function that cannot be distinguished from a random permutation (that is, a permutation selected at random with uniform probability, from the family of all permutations on the function's domain) with practical effort.

New!!: Disk encryption software and Pseudorandom permutation · See more »

Single sign-on

Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems.

New!!: Disk encryption software and Single sign-on · See more »

Sparse file

In computer science, a sparse file is a type of computer file that attempts to use file system space more efficiently when the file itself is partially empty.

New!!: Disk encryption software and Sparse file · See more »

Steganography

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.

New!!: Disk encryption software and Steganography · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: Disk encryption software and Symmetric-key algorithm · See more »

TrueCrypt

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE).

New!!: Disk encryption software and TrueCrypt · See more »

USB flash drive

A USB flash drive, also variously known as a thumb drive, pen drive, gig stick, flash stick, jump drive, disk key, disk on key (after the original M-Systems DiskOnKey drive from 2000), flash-drive, memory stick (not to be confused with the Sony Memory Stick), USB stick or USB memory, is a data storage device that includes flash memory with an integrated USB interface.

New!!: Disk encryption software and USB flash drive · See more »

VeraCrypt

VeraCrypt is an open-source utility used for on-the-fly encryption (OTFE).

New!!: Disk encryption software and VeraCrypt · See more »

Volume (computing)

In computer data storage, a volume or logical drive is a single accessible storage area with a single file system, typically (though not necessarily) resident on a single partition of a hard disk.

New!!: Disk encryption software and Volume (computing) · See more »

Redirects here:

Container encryption, Encryption on Linux.

References

[1] https://en.wikipedia.org/wiki/Disk_encryption_software

OutgoingIncoming
Hey! We are on Facebook now! »