LECTURE 5 Microsoft Windows Encryption Tools and Technology
LECTURE 5 Microsoft Windows Encryption Tools and Technology
Maintaining Microsoft
Windows Security
LECTURE 4
Microsoft Windows Encryption Tools and
Technologies
CYU 07317 Security Strategies in Windows Platforms 01/08/2025 1
What is an Encryption
Encryption is the method by which information is
converted into secret code that hides the information's
true meaning
The science of encrypting and decrypting information is
called cryptography
In computing, unencrypted data is also known as
plaintext, and encrypted data is called ciphertext.
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 2
Learning Objects
Identify encryption methods supported by Microsoft Windows
Describe EFS, BitLocker, and BitLocker To Go
Explain setup and enabling of file, folder, and volume-level
encryption
Research encryption in communications
Outline encrypted Microsoft Windows protocols
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 3
Learning Objects
Debate the advantages and the disadvantages of encrypted
communications
Describe security certificates
Examine the public key infrastructure (PKI)
Outline best practices for Microsoft Windows encryption
techniques
Discuss business challenges of implementing encryption
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 4
What is Encryption ?
Encryption is the process of transforming readable information into
unreadable information in such a way that anyone with a proper key can
reverse the process, making the information readable again
Encryption is the process of encoding information from plain
text into ciphertext so that only authorized parties can
understand the information
Encryption is one of the most common technique used to secure
data in transit
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 5
Encryption…
It is one of the another type of control mechanism used by Microsoft
Windows to protect data against attackers
Files, folders, and volumes can be encrypted using Windows encryption
tool
Data which is in transport can be vulnerable to attack
Encryption is used to ensure that no unauthorized user can view sensitive
data
Encryption also validates both the integrity and the source of the data.
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 6
Encryption Methods Supported by the
Microsoft Windows
Microsoft provides various programs and methods to
secure data with encryption tool for data at rest and data
in transit
For securing data at rest, Microsoft use the following tools:
i. BitLocker for encrypting entire volumes
ii. Encrypting File System (EFS) for encrypting files and
folders
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 7
Data in transit
For securing data in transit, Microsoft provides support for
many methods and strategies which includes:
i. Secure networking protocols
ii. Digital certificates
iii. Public key infrastructure
iv. Virtual private networks
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 8
Point to NOTE
If you need to support multiple operating systems, you’ll need to look
beyond the Windows-only options presented in this section
One of the most popular cross-platform encryption products is
Truecrypt.
You can find out more about this free open source product at:
http://www.truecrypt.org/
TPM only Transparent operation No additional input is required from the user.
TPM + PIN User authentication The user is required to enter a PIN before Windows
boots.
TPM + PIN + User authentication The user is required to enter a PIN, called the Startup
USB key PIN, and insert a USB key, called the Startup key, with
authentication credentials before Windows boots.
TPM + USB User authentication The user is required to insert a USB key with
key authentication credentials before Windows boots.
USB key only USB key mode The only authentication mode that does depend on TPM
hardware—the user only inserts a USB with
authentication credentials before Windows boots.
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 16
Comparison of the BitLocker and EFS
Feature
BITLOCKER ENCRYPTING FILE SYSTEM (EFS)
Encrypts all files on the selected volume Encrypts only selected files and folders
Either on or off for all users Encrypts files based on user actions, each user can
encrypt files or folders individually
Uses TPM or USB key as part of the Does not require any special hardware
authentication process
Must be administrator to turn BitLocker on or Any user can choose to encrypt files or folders
off
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 17
Cont…
EFS is present in the latest newly installed Windows clients and servers.
BitLocker is available on Windows workstation computers, but is not enabled by default for
Windows Server
If you plan to use BitLocker on Windows Server, you must enable it using the Server
Manager utility.
To launch Server Manager, choose Start > Server Manager.
In Server Manager, select Manage > Add Roles and Features from the menu to open the
Add Roles and Features Wizard.
Select Next four times to open the Features selection window. Select the BitLocker Drive
Encryption checkbox to add BitLocker
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 18
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 19
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 20
Cont…
Before adding BitLocker, Windows will ask you to confirm that you want to
continue.
Select Next > Install to confirm your choice to add BitLocker.
Once BitLocker has been installed, Windows will warn you that you must
restart the system.
When you select Close, Windows will ask if you want to restart your system
now or later.
Once you restart Windows, the BitLocker feature will be available for all
volumes
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 21
Figure below shows the confirmation and
completion windows
Encrypted
data
transmission
CYU 07317 Secuirty Strategies in Windows Platforms 01/08/2025 50
Secure Web application connection
Code Signing A certificate used to validate signatures of compiled programs used to detect any unauthorized
certificate changes made after signing.
Qualified certificate A certificate that identifies an individual and is commonly used with electronic signatures.
The formal PKI process would require you to request a certificate for the
connection’s target, or other end, from the PKI registration authority
(RA)
The RA authenticates you and directs the CA to issue the certificate
You would decrypt the certificate using the CA’s public key
The certificate contains the public key for the target
Once the target’s public key is obtained, you can use it to encrypt
messages that only the target can decrypt with its private key.