Capture.PNG
Document Details
Uploaded by jlopez59#
Tags
Related
- Computer Security Risks & Etiquettes - Notes PDF
- 5. Computer Security - Lec 4.pdf
- 5. Computer Security - Lec 4-23-40.pdf
- 5. Computer Security - Lec 4-23-40.pdf
- Computer Security_ Principles and Practice Global Edition-William Stallings -2017.pdf
- File System Security PDF - University of Prince Mugrin
Full Transcript
## BitLocker Encryption (2 of 3) BitLocker provides great security, but it comes with a price: - Risk the chance of TPM failure - Risk losing all copies of the BitLocker (startup) key Use BitLocker only if the risks of using it do not outweigh the risks of stolen data. If you decide to use BitLo...
## BitLocker Encryption (2 of 3) BitLocker provides great security, but it comes with a price: - Risk the chance of TPM failure - Risk losing all copies of the BitLocker (startup) key Use BitLocker only if the risks of using it do not outweigh the risks of stolen data. If you decide to use BitLocker: - Make extra copies of the startup key and/or password and keep them in a safe location. To start BitLocker Drive Encryption: - Go into BIOS/UEFI setup and enable the TPM chip. - Open the BitLocker Drive Encryption applet in Control Panel.