Encryption and Multi-use File / Folder Level Essay

Submitted By ncschugg
Words: 377
Pages: 2

Resources for encryption:
Reference Page Entry
Types of Encryption. (2012). Retrieved from http://www.colorado.edu/oit/it-security/security-awareness/encryption/types-encryption
In-Text Citation
1. Insert the paraphrased material ("Types Of Encryption", 2012).
2. The "Types Of Encryption" (2012) website Insert the paraphrased material.
3. According to "Types Of Encryption" (2012), "Insert the quotation” ().
Note: In a long online document with no page numbers, you can list the title of the section and the paragraph number within that section (see above). A key component in protecting information confidentiality is encryption. The purpose of encryption is to ensure that a company or persons data is protected against snooping attacks. This is done by keeping the data hidden to any unauthorized persons. To access the encrypted data a user must have the correct decryption key or they will not be able to read the data. There are several types of encryption: whole disk, single-user file/folder level, multi-use file/folder level, database.
Whole disk encryption is where the data on an entire physical or logical drive is encrypted, and cannot be decrypted without the correct decryption key(Types of Encryption,2012). This prevents an unauthorized user from accessing important information stored on the disk/drive. This is commonly used in software, but hardware based disk encryption is an up and coming technology. Single-user file/folder level encryption is used if a individual or company wants to encrypt a single file or a group of files(Types of