Ways of Locking down Your System

16/12/2020

Ways of Locking down Your System

Users often leave files unencrypted and generally only use a login password.

Unless a form of Encryption is enabled this is a weak attempt at protecting your data.

Any IT Windows or Linux administrator will have sufficient knowledge to gain access to your files with or without your login password.


Full Disk Encryption

Full Disk Encryption or FDE is a sure way of protecting your information when the computer has been switched off. Usually, computers employ Pre-Boot Authentication. A prompt is displayed before the computer is allowed to boot, prompting the user to enter their password or passphrase to decrypt the drive and allow the system to boot.

Power On Authentication

A system that is available on most laptops and PCs but the effectiveness depends on how the process works and if the password can be reset by resetting or reflashing the BIOS.

File-Based Encryption

File-Based Encryption or FBE keeps the information encrypted during the system’s operation and the files are only decrypted when accessed. The drive usually has a time out feature that re-encrypts the file after a set amount of time or removes the decryption key from the cache, therefore, rendering the file unreadable, until the next time the file is accessed. If the file is removed from the computer it will not be able to be read until the decryption keys and or software is installed on that machine.

GPS FDE + FBE

GPS Full Disk Encryption + File-Based Encryption this is an ultra-secure lock. Not only is the drive encrypted at boot and the important files remain encrypted during the system’s operation. The decryption key is based upon the device’s location. The sort of encryption is best for stationary computers that do not move. If the device is moved even an inch, the encryption key changes as it’s based upon the X+Y location of the unit.

Biometric Verification

Fingerprint Access and Facial Login isn’t usually recommended as a primary way of accessing your system as these measures have no duress leeway. With a password, you have the ability to enter the details wrongly or your ability to forget the details. Your unable to misremember your fingerprint nor your face….without some form of skin dissolving acid.

RELATED POST

Easy to Customize
10/05/2022

Digital Forensics | The Bug Bounty Balance

Criminals often use burner phones, these phones often are built with easier data retrieval methods, due to the lack of security software included. Modern Android phones, will have the latest Android Security patch, they also feature things like onboard encryption (especially Samsung phones).

7/05/2022

Click-Baiting – What is it and how to detect it.

Clickbait typically refers to the practice of writing sensationalized or misleading headlines [more]

7/05/2022

What is Doxxing? – An how to protect against it

It is when an internet user, with malicious intent discovers information about you and uses it in a negative way, often adding their own opinion or taking things out of context. They use this to potentially stalk or drive their victim offline.

  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/2addicted.mp3
  • https://ackerworx.uk//d/2addicted.mp3
  • Bad Wings
  • The Glitch Mob
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/BW.mp3
  • https://ackerworx.uk//d/BW.mp3
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/addicted.mp3
  • https://ackerworx.uk//d/addicted.mp3
  • Ryder Remix
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/bw2.mp3
  • https://ackerworx.uk//d/bw2.mp3