From the course: Incident Response: Evidence Collection in Windows

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Securing a system with BitLocker

Securing a system with BitLocker

From the course: Incident Response: Evidence Collection in Windows

Start my 1-month free trial

Securing a system with BitLocker

- BitLocker can be enabled and secured using four different implementation methods, TPM only, dongle only, TPM and PIN or TPM and Dongle. Now TPM only refers to a trusted platform module which is a specialized chip on a desktop or laptop that'll store an RSA encryption key specific to that machine. The TPM only mode will use the computers TPM security hardware without any pin authentication. This means that the user can start the computer without being prompted for a PIN in the windows pre boot environment. If you use this method you cannot boot this hard drive in any other computer because that computer would have a different TPM chip with different RSA keys in it. The second method is using dongle only. In dongle only implementations, the system requires a specific USB key to be connected to that computer before the hard drive can be decrypted and booted up. Essentially, this USB drive called the dongle will store the…

Contents