Protecting Information and Sensitive Data: Research Paper

Total Length: 625 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

The self-encrypting hard drives technology enables the automatic encryption of every data written to the disk while restricting access to people without the correct password immediately the computer starts up. Furthermore, since the encryption is built in to the hard drive, it automatically encrypts and decrypts with no performance delay.

Pros and Cons of Using Security Technologies:

The use of these emerging technologies in protecting information and sensitive data within an organization has both advantages and disadvantages. One of the major advantages of these technologies they help in protecting an organization in addition to being an important element of the general security puzzle. Secondly, along with others, the three emerging technologies make the jobs of employees and administrators easier since they don't have to spend a lot of time trying to figure how to protect information and sensitive data.

The major disadvantages of using these technologies is that they don't provide a fool-proof protection and aren't an alternative to an organization's detailed security plan, which has been a major concern for a long period of time. For instance, while fingerprint sensors are the most commonly found techniques of data protection, they are unfortunately easy to spoof ("Protect Sensitive Computer Files," 2009).

Stuck Writing Your "Protecting Information and Sensitive Data:" Research Paper?

When using the self-encrypting hard drives technology, the major disadvantage is that some systems like FileVault don't permit users to choose parts of the disk to encrypt. This is largely due to the fact that such systems only permit the encryption of all home directories......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Protecting Information And Sensitive Data " (2011, May 16) Retrieved May 21, 2025, from
https://www.aceyourpaper.com/essays/protecting-information-sensitive-data-44700

Latest MLA Format (8th edition)

Copy Reference
"Protecting Information And Sensitive Data " 16 May 2011. Web.21 May. 2025. <
https://www.aceyourpaper.com/essays/protecting-information-sensitive-data-44700>

Latest Chicago Format (16th edition)

Copy Reference
"Protecting Information And Sensitive Data ", 16 May 2011, Accessed.21 May. 2025,
https://www.aceyourpaper.com/essays/protecting-information-sensitive-data-44700