低密度脂蛋白高有什么症状| p和t分别是什么意思| 看男性性功能挂什么科| 一个草字头一个见念什么| 怀孕做糖耐是检查什么| 腰肌劳损用什么药| 痔疮是什么原因引起| 人乳头瘤病毒16型阳性是什么意思| 欢什么喜什么| 孕妇快生的时候有什么征兆| 什么叫闺蜜| 神经官能症是什么症状| 押韵什么意思| 上火喝什么| 为什么有两个六月| 地中海贫血是什么| 阴历六月十九是什么日子| 高温丝假发是什么材质| 三伏天喝什么汤| 涤纶是什么面料| 玉帝叫什么名字| 什么叫物质女人| 秋天可以干什么| 孔子的真名叫什么| 化疗后吃什么| 结婚有什么好处| 二级警监是什么级别| 抑制什么意思| 活性酶是什么| 六月什么星座| 四季常青财运旺是什么生肖| 李亚男为什么选王祖蓝| 红豆为什么代表相思| 毒龙钻是什么意思| 韭菜什么时候种最合适| 屁股疼痛是什么原因引起的| 苹果是什么意思| 爱慕什么意思| 胃痛去药店买什么药| 100聚酯纤维是什么面料| 除皱针什么牌子效果最好| 扁桃体发炎是什么症状| 12345是什么投诉电话| wis是什么牌子| 血浆是什么颜色| 睡眠不好会引起什么症状| 喜筵和喜宴是什么意思| 胃窦糜烂是什么意思| 头皮痛什么原因引起的| 大山羊是什么病| 朱元璋长什么样| 援交是什么意思| 因子是什么意思| 什么的图案| 肉五行属什么| 人中发红是什么原因| 在农村干什么挣钱| 乙基麦芽酚是什么东西| 吐纳是什么意思| 面部肌肉跳动是什么原因| 生理盐水敷脸有什么作用| 风疹病毒是什么意思| 宗人府是干什么的| 为什么会长生长纹| 维生素b是什么食物| socks是什么意思| 间接胆红素高是什么原因| 毛滴虫病是什么病| 浅表性胃炎伴糜烂吃什么药效果好| 扁平足为什么不能当兵| 腰痛去医院挂什么科| 10.22是什么星座| 属鸡本命佛是什么佛| 12月14日什么星座| 蜜蜂的尾巴有什么作用| attach什么意思| 滑膜炎挂什么科| 蚝油是用什么做的| 苏麻为什么不嫁给康熙| 乳腺结节吃什么散结快| 心脏跳的快是什么原因| 1948年中国发生了什么| 检查妇科清洁度三是什么意思| 痛经看什么科| 编程是干什么的| 步步生花是什么意思| 乘风破浪是什么生肖| 健康查体是什么意思| 多多益善什么意思| 单核细胞百分比偏高什么原因| 祎字五行属什么| 咽口水喉咙痛吃什么药| 坐骨神经吃什么药| 胃酸反酸水吃什么药| 我做错了什么| 辅弼是什么意思| 来减一笔是什么字| 可乐加味精女人喝了什么效果| 核磁dwi是什么意思| 怀孕什么时候打胎最合适| 火车和高铁有什么区别| 果肉属于什么组织| 散仙是什么意思| 纳肛是什么意思| 左眼跳代表什么| 感情里什么叫偏爱| 放屁很臭是什么原因| 什么的枝干| 发来贺电是什么意思| 布加综合征是什么病| 胎盘低置状态是什么意思| 掉眉毛是什么原因| 7月属什么生肖| 八字中的印是什么意思| 捞女是什么意思| 血小板是什么| 五指姑娘是什么意思| 118号是什么星座| 脾胃虚弱吃什么蔬菜| 雪纺是什么面料| 脑梗是什么病| 嘴发酸是什么原因引起| 铁皮石斛能治什么病| 白酒都有什么香型| hpv病毒是什么病毒| 细胞是什么| 白醋泡脚有什么功效| 什么蚌相争| 前夫是什么意思| 三点水一个高念什么| 红细胞平均体积偏低是什么意思| 淋菌性尿道炎吃什么药| 空调外机风扇不转是什么原因| 为什么会吐| 每天吃什么菜谱星期表| 小叶增生吃什么药| 瑞五行属什么| 膝盖疼痛是什么原因| 空调水滴是什么模式| 晚上睡觉睡不着是什么原因| 潮汐车道什么意思| 什么的摇篮| 浮生若梦是什么意思| 蚊子怕什么植物| 什么的毛主席| 宫外孕有什么症状| 紧急避孕药对身体有什么伤害| 兔子能吃什么| 男人蛋疼是什么原因| 白领是什么职业| 妮子什么意思| 198是什么意思| 汽车abs是什么意思| 气虚用什么泡水喝好| 查染色体的目的是什么| 喇蛄和小龙虾什么区别| 宝宝拉肚子吃什么药| 六月二十四是什么星座| 凉面用的是什么面条| 手腕疼痛挂什么科| 什么是公历年份| 2岁什么都听懂但不说话| 咳嗽吃什么药好得快| 肋骨骨折挂什么科| 网易是干什么的| 猪肉炖什么好吃| 脸部爱出油是什么原因| 吃绝户是什么意思| 洁字五行属什么| 补脑吃什么食物| 眼角发白是什么原因| 九三年属鸡是什么命| pci是什么| 吃什么药头脑立刻清醒| 厘清和理清的区别是什么| 上梁山是什么意思| 手指疼挂什么科| 平均血小板体积低是什么原因| 手淫是什么| 子宫复旧不良有什么症状| 痉挛吃什么药| 什么时候量血压最准| blush是什么颜色| 荨麻疹不能吃什么| 股癣用什么药膏最好| 梦到蛇是什么征兆| 杂菌2个加是什么意思| 查黄体酮做什么检查| 痘痘肌肤适合用什么牌子的护肤品| 6月23日是什么日子| 处变不惊是什么意思| 肺部ct挂什么科| 打了麻药有什么副作用| 庚寅五行属什么| 肉桂是什么味道| 做手术后吃什么对伤口恢复快| 结石能喝什么茶| 割包皮有什么用| 什么是埋线减肥| 腱鞘炎有什么治疗方法| hr是什么| 黄昏是什么时候| 世界上最难写的字是什么字| 大便干燥拉不出来是什么原因| 小孩个子矮小吃什么促进生长发育| 花枝是什么食材| gif是什么意思| 脖子后面长痘痘是什么原因| 糖醇是什么意思| 做肉丸用什么淀粉最佳| 电商属于什么行业| 止咳吃什么药| 孩子吃什么能长高| 反讽是什么意思| 眼睑炎用什么药| 手上三条线分别代表什么| 脱靶是什么意思| 怀孕送什么礼物| 16年属什么生肖| 幽门杆菌吃什么药| 什么防晒霜效果最好| 什么是频率| ad滴剂什么牌子好| 乳头痛什么原因| 扁平疣用什么药膏管用| 榴莲坏了是什么味道| 气蛋是什么病| 什么是道家| 佞臣什么意思| 晚上睡不着什么原因| 幡然是什么意思| 脉搏细是什么原因| 头晕目眩是什么病的征兆| 指甲上有白点是什么原因| 跳蚤最怕什么东西| 氧化性是什么意思| 码放是什么意思| 氟利昂是什么味道| 热射病是什么病| 凌志和雷克萨斯有什么区别| 梦见自己把头发剪短了是什么意思| 睾丸痒是什么原因| 黄精是什么药材| 胸部b超挂什么科| 2026年属什么生肖| 郡主是什么身份| 压差小是什么原因引起的| 拉肚子是什么原因导致的| 什么渐渐什么| 青灰色是什么颜色| 他是什么意思| 蓝颜知己什么意思| 婴儿吃什么奶粉好吸收| 很man是什么意思| 四叶草代表什么意思| 咳嗽喝什么| 舌头短的人意味着什么| 肺热吃什么| 溪字五行属什么| 8月28日什么星座| 今天是什么甲子| 重度抑郁症吃什么药| 太阳穴胀痛是什么原因| 什么东西有头无脚| 百度
Serdar Yegulalp
Senior Writer

金融在线交易产业链博览会之2017IFE广州金融博览会

reviews
Aug 7, 200714 mins
ComputersMicrosoftSmall and Medium Business

Microsoft's boot-drive encryption works best with specialized hardware and requires some effort to set up and run. After all that, does it work?

百度 原标题:传《现代战争2》重制版仅提供单机体验早前有报道指零售商上架《使命召唤:现代战争2》重制版。

When Microsoft announced that Windows Vista was going to be available in multiple editions, curiosity turned toward the higher-end versions of Vista targeted at corporate environments (Vista Enterprise) and enthusiasts (Vista Ultimate). Among the features in these high-end editions is BitLocker Drive Encryption, which Microsoft included to address “the theft or unwanted disclosure of data made available through physical loss of computer devices.”

Say what?

In plain language, BitLocker is an on-disk encryption system that encrypts the computer’s boot drive, making the system data on it unreadable to unauthorized users — someone who’s just made off with your laptop at the airport, for example. Without a boot key — either a manually entered PIN, a USB flash drive or a secure module on the PC itself — everything on a BitLocker-encrypted drive is indistinguishable from random data.

In the face of any number of new stories about government agencies and businesses losing notebooks and the data on them, Microsoft has stumped hard to convince users that BitLocker is the best means of preventing data loss through theft or espionage. A lost BitLocker-protected computer, Microsoft argues, can be safely written off without concern that the data on it could be compromised; and, as we are all well aware, the cost of a lost notebook is minor compared with the cost of losing the data on it.

But how realistic are Microsoft’s declarations about BitLocker? What the company promises that BitLocker can do doesn’t always match up with how BitLocker faces the challenges of the real world. Or, to put it another way, like many other encryption products, BitLocker is only as capable as the hands it’s in.

Getting the Goods

Organizations considering BitLocker for their notebook PCs can find themselves confronting some cost issues from the word go.

BitLocker is included only in the Enterprise and Ultimate SKUs of Vista — the two most expensive editions of Vista on the market. Also, Vista requires 512MB of RAM minimum (and most experts recommend 1GB or higher), which means companies might find themselves having to add RAM to existing machines or spend their money on a new fleet of notebooks.

Finally, to get the most out of BitLocker, Microsoft recommends using it on a computer equipped with a Trusted Platform Module (TPM), a microchip embedded in a PC’s motherboard that stores passwords, keys and digital certificates. (See the following section for more information about TPM.)

BitLocker in Action

In front of the system volume to be encrypted, BitLocker creates a 1.5GB boot partition that contains decryption and boot data. When Vista was first released, users had to create this partition manually before installing Vista, but after a number of complaints, Microsoft revised the BitLocker setup process so that you can create the partition on an existing system.

One of the Vista Ultimate Extras (also available for the Enterprise Edition) is labeled “BitLocker and EFS enhancements,” which contains the BitLocker Drive Preparation tool. This program automates the setup process and encrypts an existing drive for BitLocker while the system is running. (It’s still always best to have BitLocker set up on a system before it has been personalized for a given user so there is no chance of unencrypted data being stored on it at any time.)

There are three possible ways to implement BitLocker on a given system, each with its own benefits and drawbacks:

On a computer with TPM hardware, Revision 1.2: The TPM chip stores BitLocker’s decryption keys, so any attempt to reverse-engineer a key through tampering will leave the system unbootable (and the drive unreadable). Any attempts to tamper with the unencrypted boot loader will cause the system to fail.

TPM, however, is not something that can be added to a PC after the fact — it’s something that has to be included in its design from the ground up. It’s difficult to determine exactly how much TPM adds to the cost of a notebook, because TPM hardware is typically offered as part of a bundle of features in “business-class” machines. But at this point, the cost premium doesn’t appear to be a lot.

Dell, for example, typically includes TPM as a feature in its business-class notebooks, which cost about $250 more than their consumer-class counterparts but appear to make up the cost with a different mix of hardware. Consequently, an exact comparison can be somewhat difficult to figure. For instance, I priced out a business-class Dell Latitude D630 (which features TPM) at $849. A consumer-class Dell Inspiron 1420 (with no TPM, but with the same CPU, hard drive and so forth) came to $899 — with 1GB of RAM and a 160GB SATA drive added “free.” In short, whatever affects most of the cost differences between systems, it’s not likely to be TPM. (A Dell spokeswoman maintains that the cost of including TPM hardware on a given system is effectively zero because it doesn’t add anything in a way that has to be offset by raising the retail price.)

On a system without TPM hardware that boots from an external USB drive: In this scenario, the system’s boot key is stored on an external drive. The system boots from that drive first, which then supplies the decryption key that allows the rest of the system to boot.

However, this plan will not work on a system that does not support booting from a USB device, and by no means do all business-class machines support that capability. The USB boot device itself also can be stolen — and leaving the USB drive plugged in while the system is running (as many people are wont to do) is on the order of unlocking the front door of your house and leaving the key in the lock.

For this reason, using the USB drive method is probably not suitable for corporate deployments, although it’s a useful way to allow an individual to use BitLocker.

On a system without TPM, no additional hardware required: You can opt to have users enter a 48-digit PIN number at boot time, though they may find that process cumbersome and slow. Because the PIN cannot be set by the user and is difficult to memorize, most people will be inclined to write it down — another security breach waiting to happen. In light of all this, it’s clear that adding BitLocker to an existing system, with the possible risks of USB drive loss or the inconvenience of a 48-digit PIN, is inferior to using a TPM-enabled system from the outset. Running BitLocker transparently over TPM is the best option but also the most costly to implement, since in many instances it entails buying a new computer.

Whatever method you choose, when setting up BitLocker policies for your organization, be sure to enable encryption key recovery through Active Directory. When a BitLocker computer is configured, the administrator can (and should) make a backup of the encryption key into an AD repository. This way, if the key is lost but the data itself is not — for instance, if you’re using a USB drive and it goes missing — any needed data can be recovered from the system without declaring the whole thing scorched earth.

Scope of Protection

So, how well does BitLocker succeed in its stated goal of functioning as a “seamless, secure and easily manageable data protection solution for the enterprise”? It all hinges on the scope of the protection it provides.

On the plus side, BitLocker thoroughly encrypts something that has traditionally not been encryptable in Windows without the aid of third-party software: the operating system itself. An encrypted drive will remain unreadable even if mounted in another computer. This is crucially important with notebook computers, since it’s trivially easy for an attacker to gain physical access to a system and remove the hard drive.

However, BitLocker doesn’t by default encrypt anything other than the boot drive. It is possible to encrypt drives other than the boot drive with BitLocker, but this is not something that can be done automatically through BitLocker’s configuration GUI (at least not yet). Microsoft does not yet support encrypting data volumes with BitLocker either.

That said, Microsoft is reported to be providing support for this feature on a case-by-case basis with specific customers, according to Gartner analysts Jeffrey Wheatman and Neil MacDonald. However, the pair don’t expect official support from Microsoft for this kind of feature until late in 2007 or the first quarter of 2008. (A Microsoft spokesman said the company has “no information to share at this time.”)

For the time being, Microsoft recommends that companies encrypt data volumes using its Encrypting File System. EFS, which has been in existence since Windows 2000 was rolled out, is a way to perform file-by-file encryption on NTFS volumes in Windows.

EFS encrypts data only at the file level, not the volume level, so it’s possible to make educated guesses about what might be in an EFS-encrypted file through the file name or other items on the same disk. (One possible way to get around this is to place sensitive information in .zip files or in other archives that are EFS-encrypted — making sure, of course, that the name of the archive itself isn’t some kind of giveaway.)

Likewise, BitLocker doesn’t encrypt removable drives by default. But again, it’s possible to do this manually, using a process that’s much the same as encrypting a non-boot drive.

That said, in order to unlock an encrypted removable drive for use, you need to provide users with a 48-digit PIN, much as you would for any other BitLocker volume. It’s easy enough to create a batch file that handles this job, then store that batch file on the main BitLocker volume, but there’s no guarantee that the main BitLocker drive can’t be compromised in ways that have nothing to do with BitLocker’s own security (e.g., if a user walks away from the machine while it’s still logged in).

As before, it is possible to use EFS to encrypt files on removable drives or other partitions, but again, this comes with the risk of someone being able to read file names and make educated guesses about their contents.

If you want to encrypt multiple volumes in a BitLocker-protected system, you need to do one of three things: manually encrypt all the volumes (which is possible but officially unsupported); consolidate all the data to be protected on the boot volume (typically an inconvenience); or use a third-party encryption tool, either alone or in conjunction with BitLocker, that does encrypt data drives. One such product, TrueCrypt, is free and open-source and also works across operating system platforms.

Back Doors and other Vulnerabilities

So you’ve properly BitLocker-secured your machine. Could it still have exploitable vulnerabilities that remain undisclosed? Let’s ask a few more questions:

1. Has Microsoft provided any back doors into BitLocker-encrypted volumes? When the feature was announced, there was no small amount of speculation that Microsoft had made a back door of some kind available in BitLocker that would allow the encryption on a drive to be reversed.

Microsoft is unambiguous in denying this rumor. Niels Ferguson, one of the key Microsoft engineers who developed BitLocker, made the company’s position clear in his blog: “Over my dead body. … The official line from high up is that we do not create back doors.” Ferguson went on to insist that if any such thing existed, Microsoft would be required by law — not just U.S. law, but the laws of every country in which it does business — to mention it or to withdraw BitLocker entirely.

Garter’s MacDonald likewise dismisses the specter of a BitLocker back door. “Microsoft’s entire source-code base is available for limited public review, primarily to governments and universities,” he points out, “and there are many governments in the world, including U.S. allies, that want to ensure that BitLocker has no such back door.”

If such a thing did exist, it stands to reason that news of it would surface very quickly.

2. Can criminals exploit known weaknesses in the way Windows — or BitLocker itself — works? At the Black Hat conference in Amsterdam in March, security experts from India demonstrated that it was possible to subvert Vista’s boot process to introduce a rootkit that could run whether or not BitLocker was present. Once a system is subverted in this fashion, it becomes much easier for attackers to do anything they choose, from stealing data to trashing the system.

This particular crack was not so much a subversion of BitLocker, but a way to insert unsigned code into the Vista x64 kernel regardless of whether BitLocker was securing the boot volume in question, as security researcher Joanna Rutkowska explains it.

So it is theoretically possible to engineer an end run around BitLocker without having to deal directly with BitLocker’s encryption, although there is no evidence that anyone has actually gone so far as to create a proof-of-concept version of just such a crack (yet). Also, since this crack requires the cracker to access the machine directly — it can’t really be deployed remotely — it’s that much harder to pull off.

We can also include in this category any other as-yet-undisclosed attacks against Vista itself that could in theory be used to subvert BitLocker, either directly or indirectly, since BitLocker is not designed to secure the Vista kernel per se.

3. Are there any server-level vulnerabilities that could leave BitLocker-protected systems vulnerable? As Gartner’s MacDonald points out, even if you follow proper procedure and back up BitLocker keys into Active Directory, you need to also make sure the AD repository itself (e.g., Windows Server 2003) is properly secured, lest an attacker break into that and steal the keys.

Conclusions

Encryption is difficult to implement properly, no matter what the product, and Microsoft deserves kudos for making it possible to do this in such a tightly integrated way in Windows Vista.

There’s no question that when properly implemented and deployed, BitLocker can add a considerable layer of security to a computer. Just be aware that this security comes at a cost — including the price of an edition of Windows Vista that supports BitLocker, the proper hardware to fully implement it, and, most important, the effort on the part of both IT and the end user to ensure that it has all been implemented correctly.

Serdar Yegulalp writes about Windows and related technologies for a number of publications, including his own Windows Insight blog.

  The End User Is the Weakest Link

The single biggest weakness in BitLocker is the biggest weakness of any encryption system: the end user.

A user password is no good if the computer in question is never locked, and BitLocker affords no protection if someone simply sits down at a system where the user is already logged in and everything is decrypted.

Consequently, whenever BitLocker is implemented on a given system, it has to be accompanied with a proper system setup and good user habits. The former is a technical solution; the latter may be a lot harder to implement without creating a training or education program of some kind.

Here’s a short list of steps to make BitLocker as effective as possible:
  • Any BitLocker-enabled system should be set to automatically lock after only a very short period of inactivity. This reduces the possibility that a user might walk away or turn his back on his system, allowing someone to intercept data while the user is still logged in and active.
  • A BitLocker-enabled notebook should reliably suspend, hibernate or at least lock whenever the lid is closed or the power button is pressed. This way, the only way to get back into the system is either to supply the user’s password or to reboot (which in turn will require the hardware key, the PIN or both).
  • Administrators should enforce strong and regularly rotated user passwords throughout the enterprise. This is not simply for the sake of protecting the end user, but also for protecting the AD repository.
  • Give users hands-on education in how to handle BitLocker-protected hardware, and take the time to explain why the system needs to lock automatically. The more users understand, the more likely they are to comply — or at least that’s the hope.

 
天高地厚是什么生肖 鹦鹉喜欢吃什么食物 lv的全称是什么 心脾两虚吃什么食物补最快 社保卡属于什么银行
盆腔钙化灶是什么意思 总胆红素偏高是什么原因 起飞是什么意思 什么生肖不认识路 运动后恶心想吐是什么原因
4月19是什么星座 拉肚子吃什么药最有效 04属什么生肖 威慑力是什么意思 打美国电话前面加什么
骨折喝酒有什么影响吗 不可亵玩焉的亵是什么意思 19朵玫瑰代表什么意思 门的单位是什么 什么东西能解酒
射手是什么星象hcv8jop4ns8r.cn 为什么做b超要憋尿hcv8jop4ns0r.cn 淋病吃什么药hcv9jop3ns3r.cn 西安吃什么ff14chat.com 十月二十三号是什么星座hcv8jop5ns5r.cn
七月十日是什么日子hcv9jop4ns2r.cn 什么的口罩hcv8jop6ns0r.cn 蛇属什么五行hcv7jop6ns6r.cn 股票roe是什么意思hcv8jop9ns4r.cn 橄榄绿是什么颜色hcv9jop2ns3r.cn
熬夜伤什么hcv9jop3ns4r.cn 摩羯座是什么象hkuteam.com 7月7日什么星座hcv8jop6ns9r.cn 包皮炎吃什么消炎药hcv7jop6ns1r.cn 孕妇吃什么长胎不长肉hcv7jop6ns0r.cn
横截面是什么意思hcv8jop6ns6r.cn 霉菌是什么bjhyzcsm.com sage什么颜色1949doufunao.com 口若什么什么hcv9jop0ns4r.cn 囍是什么意思hcv9jop0ns9r.cn
Serdar Yegulalp

Serdar Yegulalp is a senior writer at InfoWorld. A veteran technology journalist, Serdar has been writing about computers, operating systems, databases, programming, and other information technology topics for 30 years. Before joining InfoWorld in 2013, Serdar wrote for Windows Magazine, InformationWeek, Byte, and a slew of other publications. At InfoWorld, Serdar has covered software development, devops, containerization, machine learning, and artificial intelligence, winning several B2B journalism awards including a 2024 Neal Award and a 2025 Azbee Award for best instructional content and best how-to article, respectively. He currently focuses on software development tools and technologies and major programming languages including Python, Rust, Go, Zig, and Wasm. Tune into his weekly Dev with Serdar videos for programming tips and techniques and close looks at programming libraries and tools.

More from this author

百度