Bitlocker is a safety feature encompassed in window vista and also found in several greater types, geared towards securing computer folder systems. Bitlocker codes’ disks drive together with its data. On some occasions when Bitlockers are coded, other people cannot access their information or an individual’s data even when a computer device is lost or a motherboard is fraudulently acquired. Bitlocker engages other external storage systems like; flash disk and CDs too. When an individual would like to view or get information from coded devices, he/she must log in or verify admittance to the information.
Windows can also apply a trusted platform model to find out if there is any of a processor startup procedure interfered with. A trusted platform model system manager was familiarized with window vista. The trusted platform model is a microprocessor attached to a device to perform safety functions; majorly geared on encryption of information (Kornblum, 2009). By leveraging the trusted platform model and Bitlocker, information is secured until the correct authorizations are submitted to the device. Apart from password or log in, an opening key or a pin can be applied to stop unpermitted admission to the information on the computer; on both the removable or fixed devices, users can access Bitlocker secured information through the application of smart card or pin.
A system authentication will be required, as Bitlocker protects computer devices and processors. Bitlocker provides security to the operating system by verifying the authenticity of the startup information of the processor. It also enables the software on the devices to not interrupt the opening procedures or processor device. Bitlocker also shuts down a device if any information is interfered with, and the device will not be able to restart but proceeds to salvage process mode. Installation of a Bitlocker wizard is found in either the control panel or windows explorer. At the same time, the computer processor must have the trusted platform module to completely capitalize on the encryption structures.
Cracking Bitlocker security system and access information would take four dimensions; trusted platform model fused with opening password and key, trusted platform model only, trusted platform model together with an opening password, and trusted platform model with key. It should be noted that the four ways of cracking the safety system are only applicable to the devices with a trusted platform module well-matched with a computer processor (Kornblum, 2009). The trusted platform model is a very genuine choice, insinuating that the users are only required to login to their computers. When bit lock senses alterations in the computer processor system in opening information, it will automatically activate the recovery method, and demand a recovery pin for access to be granted.
Sections of the encryption data is housed in the USB devices. It means that operators of a computer will have to key in the password to the device and also add the removable USB device to verify that he/she is a genuine user. Apart from keying on a password into the operating system, a handler has to give a key; information in encrypted devices is inaccessible minus the right password (Kornblum, 2009). The trusted platform model also has multifactor verification as it can apply both startup pin and password since both the opening pin and the removable device password are needed to access the encrypted devices.
Bitlocker can also be used without trusted platform model since not all devices will have trusted platform model. Having in mind that it is a microprocessor, an advancement of an aged computer to a fresher window type may be a problem, asserting that opening password will be the only way to secure it. Securing it may be done using Bitlockers to secure external hard drives through fusion with smart cards, automated locking, and pin.
Kornblum, J. D. (2009). BitLocker Drive Encryption Overview. Microsoft .