123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Platform Differences That Affect The Use Of Eps

Profile Picture
By Author: Shirley Green
Total Articles: 129
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

EPS has been available since the introduction of 70-291. In addition to improved file and key recovery options, two major differences in EPS between Windows 2000, Windows XP after service pack 1, and Windows Server 2003 are the default designation of encryption protocols and the ability to share an EPS file.

The default encryption protocol used in Windows XP post-service pack (SP) 1 and Windows Server 2003 is 256-bit Advanced Encryption Standard (AES). This encryption protocol is very strong, but the encryption protocol used by default in Windows 2000 is 56-bit DES-X. You must not attempt to open Windows XP or Windows Server 2003 EPS encrypted files on a Windows 2000 computer. Because the files encrypted on the Windows XP post-SP 1 computer have been encrypted with a different encryption algorithm, you will not be able to read them using Windows 2000. You might also corrupt the encrypted file by trying to do so.
The encryption protocol is changed by either editing the registry or using the Group Policy Security Option: System Cryptography. Use FIPS Compliant Algorithms For ...
... Encryption. If this free Security+ practice exams option is enabled, 3DES will be used for encrypting files. The registry can be edited to select the default EPS encryption algorithm.
File ACLs can manage access to files, but sometimes an additional layer of protection is necessary. If an attacker can gain access to your network, she might be able to com-promise an administrator account and thus access sensitive files. If a laptop contains sensitive files and is lost, the added protection of encryption, if properly managed, can prevent unauthorized individuals from reading the files. In these cases and in others, the Encrypting File System (EPS) can be used to add a layer of protection. If, however, its use is not properly managed and users aren't trained in using it, EFS offers little pro?tection and can even block legitimate access to encrypted data.
This policy is similar to the one that determines whether Active Directory objects can be audited, albeit specific to file, printer, and registry permis-sions. Set it for success and failure in the comptia security+, and then set SACLs on objects as required.

Total Views: 595Word Count: 360See All articles From Author

Add Comment

Business Articles

1. Lucintel Forecasts The Global Disposable Toothbrush Market To Grow With A Cagr Of 4.5% From 2024 To 2031
Author: Lucintel LLC

2. Lucintel Forecasts The Global Disposable Razor Blade Market To Grow With A Cagr Of 5.2% From 2024 To 2031
Author: Lucintel LLC

3. Lucintel Forecasts The Global Diaper Market To Grow With A Cagr Of 7.1% From 2024 To 2031
Author: Lucintel LLC

4. Lucintel Forecasts The Global Cotton Bud Market To Grow With A Cagr Of 6.2% From 2024 To 2031
Author: Lucintel LLC

5. Commercial Cleaning Services In Dubai – A Complete Guide For Businesses
Author: Facilico

6. Lucintel Forecasts The Global Colour Cosmetic Market To Grow With A Cagr Of 3.8% From 2024 To 2031
Author: Lucintel LLC

7. How Sustainability Scoring Is Used To Compare Esg Performance Across Industries
Author: Synesgy

8. What Makes People Choose Or Reject An Employer?
Author: Akshay Sharma

9. Luxury Travel Stays: A Guide To Elevated Comfort Near Whistler
Author: James Arthur

10. Vacation Home Guide: What To Know Before Booking Your Stay Near Whistler
Author: James Arthur

11. Responsible Bulk Sms Communication In Modern Business
Author: Bulkmsg

12. How To Restore And Polish Tarnished Copper Cookware To Like-new Shine
Author: Copper Brazier

13. Lucintel Forecasts The Global Copper Pipe & Tube Market To Grow With A Cagr Of 13.1% From 2024 To 2031
Author: Lucintel LLC

14. How Credit Delete Geeks Helps Consumers Answer How Can I Fix My Credit Score Effectively
Author: Jennie Smith

15. What Does A Consultancy For Software Testing Do? A Comprehensive Guide
Author: sweta

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: