1. Locate the description of a self-encrypting drive product. Identify the encryption algorithm and cipher mode used. Describe how the drive manages encryption keys. Identify any product certifications held by that product (FIPS 140, for example).
2. Search the Internet and find a “suspicious” volume encryption product. Identify the elements of the product description that suggest the product may not be reliable.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here