O'Reilly logo

Security Strategies in Windows Platforms and Applications by Michael G. Solomon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Microsoft Windows Encryption Tools and Technologies

IN THE PREVIOUS CHAPTER you learned how to secure data by restricting access to objects using operating system access controls. This approach works well for data at rest, or data that is stored at a single location. Access controls limit which subjects can read or write data. This provides a level of security while the data remains on the object's storage device, accessible only through Windows. The problem with this configuration is that functional data tends to be used. Sensitive data is stored in objects that need to be secured. It is also accessed at some point for the purpose of being presented, manipulated, or transmitted to another subject. Once data leaves its protected storage ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required