Re: Deciding when to do system encryption

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Thanks guys, Paul you make very good points. Noted...

>> 1. You have a server in a secured server room on a rack (is there any
need
>> and advantage to having system encryption in this particular case)

> Only if there's requirements from above... or if you're going to be
> pulling drives as backups, say, and taking them out of there.

Very interesting, Your response just gave me another question :) If I have
system encrytion on a server with RAID (dont think the type matters, but
lets say RAID 5) and hot-swappable drives and one drive fails. What happens
when you replace the drive, how do you handle rebuilding the data on the new
drive with system encryption? are there online resources/links for handling
rebuilding the data on new drives when the server/PC already had system
encryption. Or are my questions/thoughts on this way of course.

B.I.

On Tue, Oct 11, 2011 at 8:10 AM, <m.roth@xxxxxxxxx> wrote:

> Bade Iriabho wrote:
> > Hello All,
> >
> > I have read that system encryption slows a computer down. However, I am
> > more interested in when to use it. Consider the following scenarios:
>
> Some, but not that much (depending on how you're using the system).
> >
> > 1. You have a server in a secured server room on a rack (is there any
> need
> > and advantage to having system encryption in this particular case)
>
> Only if there's requirements from above... or if you're going to be
> pulling drives as backups, say, and taking them out of there.
>
> > 2. you have a server sitting in an office that is accessible by everyone
>
> It would be a good idea.
>
> > 2. You have a desktop
>
> Depends on who has access, and how much your data's worth.
>
> > 3. You have a laptop
> <snip>
> The US gov't, and federal contractors, require encryption on all laptops.
> Many companies are starting to go that way. Do *you* really want to read
> in the papers, or have your manager call you in (if it's a work laptop),
> and tell you what happened to all the information on your laptop? Or how
> someone broke into it, and used it to get to *their* network?
>
>         mark
>
> _______________________________________________
> CentOS mailing list
> CentOS@xxxxxxxxxx
> http://lists.centos.org/mailman/listinfo/centos
>
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux