From the course: Cisco Network Security: Content and Endpoint Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Hardware and software encryption

Hardware and software encryption

From the course: Cisco Network Security: Content and Endpoint Security

Start my 1-month free trial

Hardware and software encryption

- [Instructor] An endpoint, such as a laptop, desktop, or tablet, must be protected from data loss as they are also susceptible to data theft. Take steps to protect against data theft. Using strong access control is an important first step, but the next step is to encrypt the data with a strong encryption algorithm. That way, if the device is lost or stolen, or if someone is able to access the data, the only way they can get to the data is if they have the key. To protect the data, the network administrator can choose from either hardware or software encryption. Hardware encryption provides always on encryption. Authentication takes place on the hardware as the device as a dedicated processor that generates an encryption key, which the user's password will unlock. Authentication can take place by using a PIN or a biometric, such as a fingerprint. Hardware encryption is commonly used on mobile devices, such as a fingerprint scanner on an Apple iPhone. Although slightly more expensive…

Contents