Encryption is an effective and oftentimes required part of a secure cybersecurity strategy. In theory, if the data stored on a device is encrypted it should be impossible to be accessed without authorization. Unfortunately, encryption cannot guarantee complete protection. The achilles heel with encryption is presented when an attacker gains physical access to a device.
You will learn about the following:
- • The differences between software-based and full-disk encryption
- • Possible vulnerabilities with hardware encryption
- • The methods an attacker would use to gain entry to the data on an encrypted drive