Folder encryption using EFS- Protecting sensitive information in spreadsheet
The EFS or Encrypting File System is a useful built-in tool that can protect folders from unnecessary access. It also ensures transparent encryption along with transparent decryption. Mainly, standard and advanced type of encryption is used. Without having the file encryption key, it is not possible to open folders or any files. Therefore, sensitive information can be protected. It is one of the strongest types of protection methods that ensure the protection of individual folders and files. As soon as a folder or file are encrypted using EFS, an icon will be shown in Windows 10 (Coles & Landrum, 2009).
In case, an administrator resets or changes a password of any local account of user, the local account is certainly going to lose access to files that has been encrypted using EFS. It would be possible to gain access to the folder only when the file encryption key can be restored. Once a compressed folder or file is encrypted, it is impossible to compress it later. Moreover, if anyone ZIPS any EFS encrypted folder and file, it cannot be encrypted later (Gebusia, 2007). In order to encrypt a folder using EFS, the first step should be starting the Windows Explorer option present in the Start menu. The next step is to Right-click on the folder and thereafter selecting “Properties”. Under the “General” tab, the “Advanced” option should be clicked and lastly, the box present beside the Encrypt contents should be checked. These four steps should be followed in order to secure data. Hence, the EFS encryption is useful in encrypting entire drives and it is similar to Bitlocker. On the downside, the EFS encryption is less secure because the key used for unlocking the encryption is usually saved locally. Consequently, data might get leaked.
References
Coles, M., & Landrum, R. (2009). Transparent Data Encryption. In Expert SQL Server 2008 Encryption (pp. 127-150). Apress, Berkeley, CA.
Gebusia, J. (2007). Data encryption on file servers. In ISSE/SECURE 2007 Securing Electronic Business Processes (pp. 38-48). Vieweg.