File safety has remained one of the critical concerns of governments, organizations, and individuals. Some files may be containing sensitive information which ought to be kept away from wrong hands. As such, Encrypted File System is a feature invented by Microsoft to help hide sensitive data in computers ( Lee, 2009) . The EFS ensures that only the user has access to the contents of the files. The EFS was meant to address the lapses of its predecessor NTFS whose infrastructure could allow attackers to bypass its permissions. EFS uses a range of intricate symmetric keys to encrypt and decrypt data.
Despite the many security attributes of encryption file system, there are several setbacks associated with its use. Firstly, the EFS has an architecture whose effectiveness is limited data files. EFS, therefore, does not encrypt system files making it easy for an attacker to reboot the computer in case of loss ( Lee, 2009) . To counter-intrusion , it is important for the user to ensure that his computer does not get into wrong hands.
Delegate your assignment to our experts and they will do the rest.
Another setback of EFS is the fact that it has a default configuration feature incorporated in its interface. This makes it prone to attack by would-be hackers. The users need to be educated about the risks to make the fully understand the system to circumvent the flaw associated with the default configuration feature.
Finally, EFS has a recovery agent feature which makes it possible for a third party to decrypt files. The feature was primarily meant to assist governments and organizations access data in case an employee resigns or dies. The attackers may exploit such an opening to get sensitive information by removing the recovery certificate ( Lee, 2009) . The only practical remedy for such a menace is to ensure the physical security of the computer.
Despite the above setbacks of EFS, it remains the best method of securing data as long as the computers are physically secured. Cloud services may offer the best alternative, but their privacy is debatable as hackers can bring down such databases as they are primarily online-based .
It is, therefore, important to note that the EFS configurations should be enhanced to address the security concerns raised. The developers need to use a multifaceted approach to the development of the technology to seal all loopholes associated with Encrypting File System ( Lee, 2009) . The users should also understand the security issues surrounding the technologies they use and be able to raise them in advance because the technological environment is dynamic and progressive.
References
Lee, W.-M. (2009). Windows 7: Up and running . Beijing: O'Reilly.