The present methods and systems use specially isolated techniques for
promoting security in a computer system. In one embodiment of these
methods and systems, a simple file system is concealed in the storage of
the computer system and is managed with a processor and simple
non-writeable code operating on the storage device. Strong cryptographic
design permits the present computer security methods and systems to
secure data on the storage device. In one method embodiment, a computer
system is provided with an operating system in operative association with
at least one storage device, wherein the storage device includes firmware
and a processor for processing data and instructions stored on the
storage device. The method includes creating at least one security
partition in, and restricting access to, at least a portion of the
storage device by the operating system. The method also includes creating
at least one security partition in the storage device. The method also
includes providing at least one authority record and data associated with
the authority record in the storage device. System and computer-readable
medium embodiments structured in accordance with the method embodiments
discussed herein are also provided.