O'Reilly logo

Eleventh Hour Security+ by Ido Dubrawsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cryptography in Operating Systems

With increased use of laptops, third-party data centers, and hard drive backup storage, it has become clear that protecting data “in flight” should include protecting that data in storage on the operating system.

Over the years, this has seen a number of developments in encryption technologies, leading to the widespread deployment of cryptography within most enterprises.

File and folder encryption

The first application of encryption to stored data was that of file and folder encryption. In many cases, this encryption is carried out in a rather manual and ad hoc manner—running an application to encrypt a file, then running the companion decryption application when the file was needed to be edited. For folders, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required