File Protection
Let’s learn about the various forms of cryptographic file protection.
Much of the information on a device is stored in files. To protect information on a device, we need to have mechanisms that secure files. There are two main reasons to deploy cryptography to protect a file:
-
Storage protection: Most computing devices, including desktops, laptops, and smartphones, have security controls that provide some protection against unauthorized parties accessing the files stored on them. The most common control is to provide entity authentication to the device itself using a password-based mechanism. However, controls alone don’t provide strong protection since they can be relatively easy to overcome. Further, many dedicated storage devices such as DVDs, memory cards, and USB tokens have no default file storage protection mechanism, and the contents can be recovered by anyone who obtains the device itself.
-
Transfer protection: A user may want to transfer a file from one device to another. Even if the devices at either end of the communication channel have strong protection, the channel itself might be insecure. Anyone monitoring it could potentially access the file in transit.
Get hands-on with 1200+ tech skills courses.