Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Then couple that with all the recent hacker activity, new reports from the GAO (that's the Government Accounting Office) that the government can't protect it's own computers and data much less the data WE send them, reports that computer theft is on the rise and news that the FBI is now developing a new computer "worm" (read virus) to spy on citizens, I decided to sing the encryption song again. This time I'll sing a verse about personal data encryption.
So what do I mean by personal data encryption? I mean ANY data on ANY storage medium that relates to you, your family or your business. Encryption is the process of scrambling electronic data in such a way that it's unreadable to all but the owner.
For the purposes of this article I'll cover two different ways to encrypt data and the pros and cons of each.
The first way is file/folder encryption. This is the process by which someone identifies what data they want to protect on a file by file or folder basis and then encodes each file or folder using some kind of software encryption tool.
What are the pros of this style of encryption? First, each file or folder can be assigned its own "encryption key". Then, even if one key gets "cracked" open, all the other files or folders will still be safe. Next, only those files and folders you identify and select will be encrypted. This allows for a "gnat's behind" level of detail that some folks need to feel secure.
What are the cons of file or folder level encryption? Well, at this level of detail, tracking of all the different encryption keys and file locations would be an administrative nightmare! So, unless you have days to spend identifying files and folders and encrypting them or if you are really, really into details, file level encryption just isn't practical for most people.
The second way to protect personal data is drive encryption. Unlike file encryption, drive level encryption allows a user to create a reserved area on the hard drive called a container. Once created, this container can be "mounted" or set to act like another fully functional hard drive on a computer. It will appear in the file manager just like any other drive.
What are the pros for drive encryption? This space can be "mounted" using a single encryption key and the key only needs to be entered once. After it's mounted, this virtual drive can contain any data and / or program, just like any regular drive. But when it's dismounted, the virtual drive is no longer visible and the container looks like any other file, the contents of which are completely inaccessible without the encryption key.
What's the down side to drive encryption? If you forget your key, all the data and / or program information in the container is lost. Also, all the information is only protected by a single key. So if your key is compromised, all your information is available to prying eyes.
What's my recommendation? Drive encryption. Drive encryption is far more efficient than file encryption especially if you need to access your data frequently. Drive encryption also allows for the complete encryption of programs, something virtually impossible to do with file level encryption. (Well not impossible but certainly problematic and time consuming!) And by creating an encryption key of sufficient size and complexity, the single key issue becomes almost moot.
One site I visited recently stated that it would take one million computers performing one million operations per second approximately 11 trillion years to crack a 128 bit encryption key! So, by using an encryption key of about 64 random characters, a hacker would need multiple life times to crack open your files.
There are several programs available online for both file and drive encryption. All these programs differ in functionality, price, encryption algorithms and interfaces. The best way to proceed is to do a search from your favorite search engine on encryption tools and read about the options available.
Don't wait! The day will come when your system gets compromised by some hacker or thief or FBI agent and then you'll wish you had protected your data.
Privacy is your right! Exercise it!
Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.
He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
![]() |
|
![]() |
|
![]() |
|
![]() |
What is Phishing? In a typical Phishing attack, a criminal... Read More
With the advent of the World Wide Web, a whole... Read More
We all know that it's dangerous to use the same... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
If you use emails actively in your communication, you must... Read More
It has been said that with the wealth of information,... Read More
In 1997, I decided after 15 years as a practicing... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
By browsing a web page, you could infect your computer... Read More
Did you know...? 1 in 5 children who use computer... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Working from home has its advantages, including no commute, a... Read More
A new variation of the Nigerian Scam theme ... Read More
It's late. You've been scouring the web for that perfect... Read More
Microsoft routinely releases new security updates, many of which are... Read More
As the number of people using the Internet as an... Read More
When the Internet first came about, it was realized it... Read More
Computer infections can be broken up into 4 main categories... Read More
Despite the current wave of identity theft and corporate security... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
As more people are logging onto the Internet everyday, Network... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
You are at your computer, checking out software on EBay.... Read More
Shopping for horse gifts or other gift items on the... Read More
I got a virus the other day, Thursday I believe... Read More
Huge number of spyware software applications are available in the... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Paypal is a great site and is used by many... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Did you know...? 1 in 5 children who use computer... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
As the number of people using the Internet as an... Read More
Pharming is one of the latest online scams and rapidly... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Do you sometimes notice your computer running slower. Is your... Read More
You'd better learn news from media, not from emails, security... Read More
You can detect spyware online using free spyware cleaners and... Read More
In 1997, I decided after 15 years as a practicing... Read More
Despite the current wave of identity theft and corporate security... Read More
As you know, this time the virus under the name... Read More
When it comes to reporting Internet scams most of us... Read More
There are ways to insure security though. You can get... Read More
While clicking from site to site on the internet you... Read More
To blog or not to blog? Well, why not? Lots... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
A couple of years back, I paid my dues the... Read More
Imagine this ? you open up your email box and... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
During the release of a new software product specialized to... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
A few nights ago I received an email from "2CO"... Read More
The Internet is a vast International Network of people and... Read More
No longer are viruses the only threat on the internet.... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
What is computer security? Computer security is the process of... Read More
As more people are logging onto the Internet everyday, Network... Read More
Business on the internet is getting down right shameless. This... Read More
Have you ever got an email asking you to confirm... Read More
Before you enter your name, address or any other data... Read More
Internet Security |