Statements (49)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Data_Security_Technique
|
| gptkbp:alsoKnownAs |
File Encryption
|
| gptkbp:appliesTo |
Individual Files
|
| gptkbp:benefit |
Facilitates Secure Sharing
Limits Data Exposure Supports Multi-User Environments |
| gptkbp:category |
gptkb:Information_Security
Cryptography |
| gptkbp:contrastsWith |
gptkb:Full_Disk_Encryption
|
| gptkbp:enables |
Granular Access Control
Selective Encryption |
| gptkbp:implementedIn |
Encryption Software
Operating System Features Third-Party Tools |
| gptkbp:limitation |
Performance Overhead
Key Management Complexity Does Not Protect Metadata May Be Harder to Manage at Scale |
| gptkbp:purpose |
Protect Confidentiality of Files
|
| gptkbp:regulates |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:GDPR |
| gptkbp:relatedTo |
gptkb:Transport_Layer_Security
Data-at-Rest Encryption Folder-Level Encryption Volume Encryption |
| gptkbp:requires |
Key Management
Encryption Key |
| gptkbp:software |
gptkb:VeraCrypt
gptkb:GnuPG AxCrypt BitLocker (File-level mode) EFS (Encrypting File System) |
| gptkbp:supportsAlgorithm |
gptkb:RSA
gptkb:DES gptkb:Twofish gptkb:AES gptkb:Blowfish gptkb:3DES |
| gptkbp:usedIn |
gptkb:Cloud_Storage
gptkb:Personal_Computers Mobile Devices Enterprise File Systems |
| gptkbp:vulnerableTo |
gptkb:malware
Key Theft Weak Passwords |
| gptkbp:bfsParent |
gptkb:Data_at_Rest_Encryption
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
File-Level Encryption
|