Thanks guys, Paul you make very good points. Noted... >> 1. You have a server in a secured server room on a rack (is there any need >> and advantage to having system encryption in this particular case) > Only if there's requirements from above... or if you're going to be > pulling drives as backups, say, and taking them out of there. Very interesting, Your response just gave me another question :) If I have system encrytion on a server with RAID (dont think the type matters, but lets say RAID 5) and hot-swappable drives and one drive fails. What happens when you replace the drive, how do you handle rebuilding the data on the new drive with system encryption? are there online resources/links for handling rebuilding the data on new drives when the server/PC already had system encryption. Or are my questions/thoughts on this way of course. B.I. On Tue, Oct 11, 2011 at 8:10 AM, <m.roth@xxxxxxxxx> wrote: > Bade Iriabho wrote: > > Hello All, > > > > I have read that system encryption slows a computer down. However, I am > > more interested in when to use it. Consider the following scenarios: > > Some, but not that much (depending on how you're using the system). > > > > 1. You have a server in a secured server room on a rack (is there any > need > > and advantage to having system encryption in this particular case) > > Only if there's requirements from above... or if you're going to be > pulling drives as backups, say, and taking them out of there. > > > 2. you have a server sitting in an office that is accessible by everyone > > It would be a good idea. > > > 2. You have a desktop > > Depends on who has access, and how much your data's worth. > > > 3. You have a laptop > <snip> > The US gov't, and federal contractors, require encryption on all laptops. > Many companies are starting to go that way. Do *you* really want to read > in the papers, or have your manager call you in (if it's a work laptop), > and tell you what happened to all the information on your laptop? Or how > someone broke into it, and used it to get to *their* network? > > mark > > _______________________________________________ > CentOS mailing list > CentOS@xxxxxxxxxx > http://lists.centos.org/mailman/listinfo/centos > _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos