Category
Encryption
Level
Intermediate
Number
50
In the realm of cybersecurity, BitLocker is like a shield that protects your valuable data on Windows computers. It does this by turning your data into secret code that only you can unlock with a special key.
Think of BitLocker as a guard standing watch over your computer files. Even if someone tries to sneak in and take a peek without permission, they won't understand anything because everything is hidden behind BitLocker's encryption. This keeps your data safe from prying eyes and keeps you in control of who gets to see what.
Here's how BitLocker works in simple way:
- Encryption Process: When you turn on BitLocker for a disk volume (like your C: drive), it Converts data into a secret code using complex algorithms.
- Decryption Key: To access the encrypted data, you need the decryption key. This key is either stored in a Trusted Platform Module (TPM) chip on your computer (hardware-based encryption) or provided by you as a PIN or password (software-based encryption).
- Hardware-based encryption → is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption
- The decryption key → used to unlock encrypted data is stored in the Trusted Platform Module (TPM) is chip on your computer for hardware-based encryption. For software-based encryption, the key is provided by you as a PIN or password.
- The encrypted data → itself is stored on the disk volume of your computer.
- Access Authentication: When you boot up your computer, BitLocker checks if everything is secure. If you're using hardware-based encryption with TPM, BitLocker verifies that the TPM chip hasn't been tampered with. If you're using a PIN or password, you'll need to enter it to unlock the encrypted data.
- Data Access: Once authenticated, BitLocker decrypts the data in real-time as you access it. This means you can use your computer as usual, with the decrypted data being temporarily available for your applications and processes.
- Locking Mechanism: Locks encrypted data when computer is off or in hibernation, requiring the decryption key for access.
- Quick NOTE: Sleep VS hibernate → two power-saving modes
- Sleep Mode: Quick wake-ups, moderate power use, great for short breaks. Data is stored in RAM for fast access.
- Hibernate Mode: Longer wake-ups, minimal power use, ideal for extended inactivity. The computer's state is saved to the hard drive or SSD in a hibernation file, and upon waking up, it's restored into RAM.
Summary:
- BitLocker is like a guard that protects your computer files by turning them into secret code.
- It keeps your data safe from unauthorized access and gives you control over who can see it.
- You can use features like TPM or a secret code (password) for added security.
- With BitLocker, your data stays safe and secure, giving you peace of mind.