CRU Dataport ToughTech Secure Q 사용자 설명서 - 페이지 7
{카테고리_이름} CRU Dataport ToughTech Secure Q에 대한 사용자 설명서을 온라인으로 검색하거나 PDF를 다운로드하세요. CRU Dataport ToughTech Secure Q 12 페이지. Hard drive enclosure
CRU Dataport ToughTech Secure Q에 대해서도 마찬가지입니다: 빠른 시작 매뉴얼 (2 페이지)
CRU
4. Encryption Information
The information in this section applies only to the "Secure" models of ToughTech.
ToughTech Secure employs hardware-based AES 128 or 256 encryption to protect your data from
unauthorized access. AES (Advanced Encryption Standard) is a government approved encryption
algorithm (FIPS PUB 197). With ToughTech Secure you'll get guaranteed full-disk hardware based
encryption, with no loss of speed.
Encryption is performed automatically by ToughTech Secure's real-time encryption engine. Your
computer will see the volume available as a normal full-speed drive. If your drive is lost or stolen,
however, you can rest assured that without the proper AES Encryption Key, no one will be able to view its
contents.
4.1 How to use ToughTech Secure Q with a key
Using ToughTech Secure is very easy.
• Connect the external drive to your computer via FireWire, USB, or
eSATA.
• Insert your AES Encryption Key into ToughTech Secure.
• Wait for the green LED to light up on the front of ToughTech Secure.
This confirms the key is accepted.
• You can now remove the AES Encryption Key. It's not needed again
until the power is cycled.
The ability to remove the key after power up helps you keep your physical key safe.
4.2 AES encryption keys
Your ToughTech Secure comes with 3 identical, programmed keys. These three keys exist so you can
• Keep one with you (for your own use)
• Keep a backup on site in a safe location
• Keep a backup off site in a safe location
These keys will be completely unique to you. If one of your keys is compromised, via theft or loss, you
should consider replacing your key set. For your convenience, we offer replacement pre-programmed
key sets, which contain unique encryption keys.
4.3 AES encryption key programmer
It is possible for you to create your own keys, should you wish to do so. To
program a new encryption key, you will need the AES Encryption Key
Programmer (sold separately). While we do not retain copies or records of
customers' keys, some customers' security protocols may demand that they have
more control over the key itself. There are also situations where more than three
keys are needed - for granting access to more than one person, for example.
And we're also aware of situations where encryption keys must change on a
timed schedule. These customers will be interested in the AES Encryption Key
Programmer, which will create or copy their AES Encryption Keys.
U s e r M a n u a l f o r T T - Q , T T S - Q ( A9 - 0 0 0 - 0 0 0 1 r e v 1 . 5 )
- 7 -