Statements (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Data Security Technique
|
gptkbp:alsoKnownAs |
File Encryption
|
gptkbp:appliesTo |
Individual Files
|
gptkbp:benefit |
Facilitates Secure Sharing
Limits Data Exposure Supports Multi-User Environments |
gptkbp:category |
gptkb:Information_Security
Cryptography |
gptkbp:contrastsWith |
gptkb:Full_Disk_Encryption
|
gptkbp:enables |
Granular Access Control
Selective Encryption |
https://www.w3.org/2000/01/rdf-schema#label |
File-Level Encryption
|
gptkbp:implementedIn |
Encryption Software
Operating System Features Third-Party Tools |
gptkbp:limitation |
Performance Overhead
Key Management Complexity Does Not Protect Metadata May Be Harder to Manage at Scale |
gptkbp:purpose |
Protect Confidentiality of Files
|
gptkbp:regulates |
gptkb:HIPAA
gptkb:PCI_DSS gptkb:GDPR |
gptkbp:relatedTo |
gptkb:Transport_Layer_Security
Data-at-Rest Encryption Folder-Level Encryption Volume Encryption |
gptkbp:requires |
Key Management
Encryption Key |
gptkbp:software |
gptkb:VeraCrypt
gptkb:GnuPG AxCrypt BitLocker (File-level mode) EFS (Encrypting File System) |
gptkbp:supportsAlgorithm |
gptkb:RSA
gptkb:DES gptkb:Twofish gptkb:AES gptkb:Blowfish gptkb:3DES |
gptkbp:usedIn |
gptkb:Cloud_Storage
gptkb:Personal_Computers Mobile Devices Enterprise File Systems |
gptkbp:vulnerableTo |
malware
Key Theft Weak Passwords |
gptkbp:bfsParent |
gptkb:Data_at_Rest_Encryption
|
gptkbp:bfsLayer |
8
|