Security mechanisms summary
Navigation:
Find
Password Protected Files > Security mechanisms summary
Find
Protected designed to search for hidden password protected files on
local disks and across a network.
|
1. In the simplest case, to protect your information (e.g. e-mail, archives, text documents) you can use only built-in tools of these applications. However, encryption methods used in these applications are not reliable enough.
2. With higher security requirements, it’s better to use special security methods. In this case confidential data may be encrypted using special software, or just hidden (stenography). The easiest (but not reliable) way is to hide a file by renaming it. To raise reliability of hiding of confidential data you can use special applications, which place secret data inside graphics or audio files, so that such replacement is invisible. And, finally, the data may be encrypted through its organization in the form of special PGP disks. This method has quite high reliability and, furthermore, the disk is very easy for use.
3. There are no security tools providing a total reliability.
YOUR FEEDBACK
Please, let us know what you
think about this article:
|