In this chapter, we look at the problem of protecting an entire storage device, as opposed to protecting individual files. We look at the following:
■ Risks and policy alternatives for protecting drive contents
■ Block ciphers that achieve high security
■ Block cipher encryption modes
■ Hardware for volume encryption
■ Software for volume encryption