HP ProBook 4540s HP ProtectTools Getting Started - Page 128

Encryption File System EFS, Drive Encryption

Page 128 highlights

cryptography The practice of encrypting and decrypting data so that it can be decoded only by specific individuals. dashboard A central location where general users can access and manage the features and settings in Security Manager for HP ProtectTools. decryption A procedure used in cryptography to convert encrypted data into plain text. device access control policy The list of devices for which a user is allowed or denied access. device class All devices of a particular type, such as drives. digital certificate Electronic credentials that confirm the identity of an individual or a company by binding the identity of the digital certificate owner to a pair of electronic keys that are used to sign digital information. digital signature Data sent with a file that verifies the sender of the material, and that the file has not been modified after it was signed. domain A group of computers that are part of a network and share a common directory database. Domains are uniquely named, and each has a set of common rules and procedures. Drive Encryption Protects your data by encrypting your hard drive(s), making the information unreadable by those without proper authorization. Drive Encryption logon screen A logon screen that is displayed before Windows starts up. Users must enter their Windows user name and their password or smart card PIN. Under most circumstances, entering the correct information at the Drive Encryption logon screen allows access directly into Windows without having to log on again at the Windows logon screen. DriveLock A security feature that links the hard drive to a user and requires the user to correctly type the DriveLock password when the computer starts up. emergency recovery archive A protected storage area that allows the reencryption of Basic User Keys from one platform owner key to another. encryption A procedure, such as use of an algorithm, employed in cryptography to convert plain text into cipher text in order to prevent unauthorized recipients from reading that data. There are many types of data encryption, and they are the basis of network security. Common types include Data Encryption Standard and public-key encryption. Encryption File System (EFS) A system that encrypts all files and subfolders within the selected folder. fingerprint A digital extraction of your fingerprint image. Your actual fingerprint image is never stored by Security Manager. 118 Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

cryptography
The practice of encrypting and decrypting data so that it can be decoded only by specific individuals.
dashboard
A central location where general users can access and manage the features and settings in Security Manager
for HP ProtectTools.
decryption
A procedure used in cryptography to convert encrypted data into plain text.
device access control policy
The list of devices for which a user is allowed or denied access.
device class
All devices of a particular type, such as drives.
digital certificate
Electronic credentials that confirm the identity of an individual or a company by binding the identity of the digital
certificate owner to a pair of electronic keys that are used to sign digital information.
digital signature
Data sent with a file that verifies the sender of the material, and that the file has not been modified after it was
signed.
domain
A group of computers that are part of a network and share a common directory database. Domains are uniquely
named, and each has a set of common rules and procedures.
Drive Encryption
Protects your data by encrypting your hard drive(s), making the information unreadable by those without proper
authorization.
Drive Encryption logon screen
A logon screen that is displayed before Windows starts up. Users must enter their Windows user name and
their password or smart card PIN. Under most circumstances, entering the correct information at the Drive
Encryption logon screen allows access directly into Windows without having to log on again at the Windows
logon screen.
DriveLock
A security feature that links the hard drive to a user and requires the user to correctly type the DriveLock
password when the computer starts up.
emergency recovery archive
A protected storage area that allows the reencryption of Basic User Keys from one platform owner key to
another.
encryption
A procedure, such as use of an algorithm, employed in cryptography to convert plain text into cipher text in
order to prevent unauthorized recipients from reading that data. There are many types of data encryption, and
they are the basis of network security. Common types include Data Encryption Standard and public-key
encryption.
Encryption File System (EFS)
A system that encrypts all files and subfolders within the selected folder.
fingerprint
A digital extraction of your fingerprint image. Your actual fingerprint image is never stored by Security Manager.
118
Glossary