The present methods and systems use specially isolated techniques for promoting
security in a computer system. In one embodiment of these methods and systems,
a simple file system is concealed in the storage of the computer system and is
managed with a processor and simple non-writeable code operating on the storage
device. Strong cryptographic design permits the present computer security methods
and systems to secure data on the storage device. In one method embodiment, a computer
system is provided with an operating system in operative association with at least
one storage device, wherein the storage device includes firmware and a processor
for processing data and instructions stored on the storage device. The method includes
creating at least one security partition in, and restricting access to, at least
a portion of the storage device by the operating system. The method also includes
creating at least one security partition in the storage device. The method also
includes providing at least one authority record and data associated with the authority
record in the storage device. System and computer-readable medium embodiments structured
in accordance with the method embodiments discussed herein are also provided.