Friday, May 3, 2013

Guidelines for the design of secure encryption and decryption of files

Follow these guidelines to the design of secure encryption and decryption of files: Disable EFS to http://ezinemark.com/goto.php?url=http a MCTS certification / a> EFS policy. specify who should be allowed to use EFS, and train users.Partition using EFS. It is not necessary for all users to encrypt the file. You Enabling and disabling EFS in a GPO and link the GPO to each container, which can either enable or disable the use of EFS. If the EPS is used to harden. This can be done by: ensuring encrypted temporary folder. Application to write the file to a temporary folder. If the folder is not marked by encryption, clear text copies of your sensitive data with them. delete a setting page file on shutdown. The page file can also clear text copies of encrypted documents. If an attack will have physical access to the computer, the file pages are protected, while running the system, but when you shut down the system, the attacker access. Using encrypted file recovery key or recovery, which allowed a large number of users files. The key to recovery in the high security situations. File Recovery is used, the design method for restoring files. Require security href = "http://ezinemark.com/goto.php?url=http://www.examshots.com/certification/A+-64.html"> key and train users how to do it. If the file recovery may employ the use of PKI: design process for the recovery of files. Place the file in the recovery agent for special accounts. This should not account for the activities of the user or administrator is used. They can be mapped by authorized personnel file recovery when the need arises. disable and protect files recovery agent account until they are needed. exported file recovery key, and consider the restoration of the private key file from the network. only when necessary to restore files. Secure maintain all files in the recovery agent key, and store them in a safe place. If the recovery key can be used with PKI: enforce role separation. key archival and key recovery process. (See Chapter 2 for more information on key archive.) Use. Unique account for the Key Recovery Agent Key Recovery Agents should not administrator or CA Certificate Manager. Use / special account for key MCITP certification recovery agent. 70-680 Exam designed for professionals who analyze the business requirements designed. The author deals with the problems and knowledge of MCSE Certification.If have research questions about MCSE, you can comments on the article the author publiced.