Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Device Encryption

Web 2.0 and Cloud Technologies for Implementing Connected Government
In this case, stored information and data are secured using device encryption techniques. The data on the device cannot be opened or read by anyone except the one who has the password or PIN value. Even the hardware and software manufacturers cannot intrude the system to get the data. Smart phones and computer devices usually use this device encryption.
Published in Chapter:
Citizen Data in Distributed Computing Environments: Privacy and Protection Mechanisms
Beaulah Soundarabai P (Christ University (Deemed), Bangalore, India), Pethuru Raj (Reliance Jio Platforms Ltd., Bangalore, India), and Zaigham Mahmood (University of Northampton, UK & Shijiazhuang Tiedao University, China)
DOI: 10.4018/978-1-7998-4570-6.ch009
Abstract
Data security is paramount in the increasingly connected world. Securing data, while in transit and rest, and while under usage, is essential for deriving actionable insights out of data heaps. Incorrect or wrong data can lead to incorrect decisions. So, the confidentiality and integrity of data have to be guaranteed through a host of technology-inspired security solutions. Organizational data is kept confidentially by the businesses and governments, often in distant locations (e.g., in cloud environments), though more sensitive data is normally kept in house. As the security mechanisms are getting more sophisticated, cyber security attacks are also becoming more intensive, so there is a constant battle between the organisations and the hackers to be one step ahead of the other. In this chapter, the aim is to discuss various mechanisms of accomplishing citizens' data confidentiality and privacy and to present solution approaches for ensuring impenetrable security for personal data.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR