10 Oct 2022

72

Issues with the Encrypting File System (EFS)

Format: APA

Academic level: University

Paper type: Coursework

Words: 376

Pages: 1

Downloads: 0

File safety has remained one of the critical concerns of governments, organizations, and individuals. Some files may be containing sensitive information which ought to be kept away from wrong hands. As such, Encrypted File System is a feature invented by Microsoft to help hide sensitive data in computers ( Lee, 2009) . The EFS ensures that only the user has access to the contents of the files. The EFS was meant to address the lapses of its predecessor NTFS whose infrastructure could allow attackers to bypass its permissions. EFS uses a range of intricate symmetric keys to encrypt and decrypt data. 

Despite the many security attributes of encryption file system, there are several setbacks associated with its use. Firstly, the EFS has an architecture whose effectiveness is limited data files. EFS, therefore, does not encrypt system files making it easy for an attacker to reboot the computer in case of loss ( Lee, 2009) . To counter-intrusion , it is important for the user to ensure that his computer does not get into wrong hands. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Another setback of EFS is the fact that it has a default configuration feature incorporated in its interface. This makes it prone to attack by would-be hackers. The users need to be educated about the risks to make the fully understand the system to circumvent the flaw associated with the default configuration feature. 

Finally, EFS has a recovery agent feature which makes it possible for a third party to decrypt files. The feature was primarily meant to assist governments and organizations access data in case an employee resigns or dies. The attackers may exploit such an opening to get sensitive information by removing the recovery certificate ( Lee, 2009) . The only practical remedy for such a menace is to ensure the physical security of the computer. 

Despite the above setbacks of EFS, it remains the best method of securing data as long as the computers are physically secured. Cloud services may offer the best alternative, but their privacy is debatable as hackers can bring down such databases as they are primarily online-based . 

It is, therefore, important to note that the EFS configurations should be enhanced to address the security concerns raised. The developers need to use a multifaceted approach to the development of the technology to seal all loopholes associated with Encrypting File System ( Lee, 2009) . The users should also understand the security issues surrounding the technologies they use and be able to raise them in advance because the technological environment is dynamic and progressive. 

References 

Lee, W.-M. (2009). Windows 7: Up and running . Beijing: O'Reilly. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Issues with the Encrypting File System (EFS).
https://studybounty.com/issues-with-the-encrypting-file-system-efs-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration