Two commonly used encryption standards are Rivest, Shamir, Adleman (RSA) and Advanced Encryption Standard-256 (AES-256). Healthcare files, bank account information, social security numbers, and home addresses are examples of information that is often encrypted. Organizations use endpoint encryption software to protect sensitive information where it is stored and when it is transmitted to another endpoint. Endpoint encryption essentially protects the operating system from installation of “Evil Maid” attacks that can install a keylogger or corrupt boot files and locks files stored on laptops, servers, tablets, and other endpoints to prevent unauthorized users from accessing the data. Encryption is the process of encoding or scrambling data so that it is unreadable and unusable unless a user has the correct decryption key.
0 Comments
Leave a Reply. |