Using Disk Encryption Lab
Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). Using disk encryption will help to protect and secure data. A perfect example of this is the stolen laptop scenario. When a laptop is stolen, the data on the hard drive can be accessible to attackers under certain conditions. In this lab, you...
Already have an account? Sign In »

Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). Using disk encryption will help to protect and secure data. A perfect example of this is the stolen laptop scenario. When a laptop is stolen, the data on the hard drive can be accessible to attackers under certain conditions. In this lab, you will see what the differences are for an “attacker” when data is not encrypted and when the data on the disk is encrypted.