Hardware-based full disk encryption: Difference between revisions

Content deleted Content added
m Category:CS1 errors: deprecated parameters: migrate 1/1 |dead-url= to |url-status=; minor cleanup; WP:GenFixes on
replace incorrect plural with correct possessive
Line 33:
 
==Characteristics==
Hardware-based encryption when built into the drive or within the drive enclosure is notably transparent to the user. The drive except for bootup authentication operates just like any drive with no degradation in performance. There is no complication or performance overhead, unlike [[disk encryption software]], since all the encryption is invisible to the [[operating system]] and the host [[Central processing unit|computerscomputer's processor]].
 
The two main use cases are [[Data at Rest]] protection, and Cryptographic Disk Erasure.