Sei sulla pagina 1di 1

Full Disk Encryption By William Poochie Jones The use of cryptography, or encryption, dates back to 1900 BC.

In its earliest forms it was called secret writing, as it primarily purpose was providing message confidentiality. The ancient Greeks used a cipher device called an scytale1. They would wrap paper around the scytale and write a message on it. Then when the paper was unwrapped, its message was scrambled. The paper would be sent to another party who had a duplicate sized scytale. Upon wrapping the paper around it, the message was revealed. As technology progressed, so did the means of scrambling and unscrambling messages. Encryption in the modern era uses electronic devices to aid in the encrypting and decrypting of information. Cipher devices have been replaced by keys, i.e. passwords, biometric devices, etc. Encryption has been expanded beyond communication confidentiality, to include encrypting of any kind of data that is represented in binary form. Allowing for the encrypting of computer networks, folders and files. With the combined use of computers and mathematical algorithms, encrypting/decrypting keys cab be more complex and more difficult to crack. But these same technology that create these complex keys can be use to aid in the unauthorized deciphering of data, i.e. brute force attack. Businesses, like banks use encryption to block access to their stored confidential information. Some business encrypt the data that is accessed, securing the contents of folders and files in the case of loss or breach. Full Disk Encryption (FDE) does both by blocking the access to data and securing of systems data. FDE is initiated using software or hardware tools, it can require a Pre-Boot Authentication to access the Operating System and then it encrypts in real-time, everything written on a volume or disk. This ensures the data is secure whether or not encryption is initiated by the user. Encryption is very important to Sansio, a Web-based Software as a Service (SaaS) provider who captures and hosts data for home care agencies, nursing homes, and Fire/ EMS organizations. The stored data contains Protected Health Information (PHI), known in its electronic form as ePHI, which is protected by the Health Insurance Portability and Accountability Act (HIPAA). Sansio is considered a business associate to the organizations, or covered entities, for which it hosts data for. In 2009, in addition to the Security Safeguards established by HIPPA, the government introduced the Health Information Technology for Economic and Clinical Health Act (HITECH Act), to address privacy and security concerns associated with the electronic transmission of health information. Before the introduction of the HITECH Act, a business associate was exempt from liability connected to a breach of a covered entitys data. The HITECH Act extended the civil and criminal penalties associate with the breach of data to covered entity's business associates, as well as establish breach notification requirements2. By implementing FDE technology, Sansio will satisfy one of HIPPAs chief Technical Safeguards which requires information system housing ePHI, be encrypted. By using FDE technology, Sansio will assured the encryption of all things written to disk. This eliminates the need to have a user initiate the encryption process, reducing the amount of breaches associated with users error. Sansio intends to deploy FDE technology on the Mobile devices used by it customers. This is vital for these devices as they are used in multiple locations. One device will be in several different hospitals, ambulances, different homes, automobiles, or multiple buildings. This increases the potential of being lost or stolen. FDE technology renders that data unaccessible on the devices and if extracted the information is unreadable.

V. IAshchenko (2002). "Cryptography: an introduction". AMS Bookstore. p.6. ISBN 0-82182986-6 2