Your intent as described seems appropriate for an Access BE file. The combination of shared BE and distributed FE is the preferred way to go. However, there is more to it than just the FE/BE configuration.
The "connection" I mentioned depends on something I don't recall you mentioning in this thread. I recommend some kind of switchboard or dispatcher form that everyone sees. You use it to block people from seeing the infrastructure of your FE file, which would be the first method of infiltration if they wanted to hack your system.
Ridders and others commented in passing about hiding the ribbon, hiding the navigation pane, disabling the various short-cuts and shift-key bypass, things like that. With a properly locked-down switchboard, anything that anyone wants to do must be supported as an option in the "dispatcher" form, which will always be open and will hide the structure of its parent DB. I leave it to you to search this forum for the myriad articles that deal with the "Switchboard" concept. I will only discuss it here in passing because it is a wheel I don't need to re-invent.
In that switchboard form you can establish a "persistent" connection to the BE by using code to open a recordset to some "trash" table (or it could be significant in some way). The code would run when the switchboard form opens (i.e. Form_Open event). In my case, I made the back end's version number the only record in a little table, and I used it to compare the FE version to the BE version. I tested it but then didn't close it. You do not close the "keep alive" recordset until your user initiates the "Application exit" sequence according to your rules on shutting things down.
You can effectively disable the little X control in the upper right of the window by trapping the Form's attempt to shut down. The Form_Unload event has a Cancel parameter, which if you set it to TRUE will prevent the form from closing even if they click the X. (This isn't perfect since Task Manager and some persistence could still shut it down.) When I had to do this, I had an internal Boolean in a public module that was initialized as FALSE when the switchboard opened. If the user clicked my "Exit" command button, the button-click code set the the variable to TRUE. When the Form_Unload event fired, the code saw the flag had been set so allowed the Exit to happen. But if someone tried any other method to close things down, the flag would still be FALSE and the Unload would be canceled. That enabled me to perform an orderly shutdown which included closing that persistent connection.
The point here is that Access optimizes its network connections. If you open the network link to the BE and then close it again, then (using Arnel's "IN external-database" syntax) you have to log in and set up encryption for every action that opens a recordset in that BE file. But if Access sees that you have a connection already open and set up for encryption/decryption, it will "ride" the connection and not go through the overhead of opening the port, establishing the encryption, performing one transaction, and closing the port again. It will re-use the open connection. Less overhead, and that is good for you to know since you expressed concern about performance.
As to the security aspect of this: The information regarding that connection is only visible in one of the hidden Access system tables, and only for as long as that connection is open. Windows versions after WinNT conform to the U.S. Dept. of Defense standards regarding isolation and object re-use, so no other process can see that information unless they have some
extremely elevated Windows privileges. In which case all security bets are off anyway.
If your switchboard or dispatcher form is robust, then nobody can look INTO your process and your user can't break out of the switchboard to "peek" while running the process, which means that the dynamic connection is about as secure as is possible.
I don't know if this has been enabled for MS Access, but here is how you add security to the dynamic network link between client and server processes:
https://docs.microsoft.com/en-us/windows-server/storage/file-server/smb-security
Since this is something you do at the server end of the connection (essentially, declare a Share folder to require encrypted connections), it would simply be part of the network overhead associated with establishing the connection. By using a persistent connection as described earlier, you would reduce the overhead for each time you open a recordset. There IS a performance warning in the article because ANY time you involve encryption, you encounter delays. You pay a price for increasing security and the currency of that price is performance.
Let me be clear:
If you use Arnel's method which puts a password on the database to effectively encrypt it, you are addressing
security at rest. This is meant to stop people from reading the file on the server by hacking into it. If they steal a copy of the file but don't have the password, they have to hack it, which could take a long time.
If you attempt to use SMB encryption on the server-side Share folder that holds the BE file, you are addressing
security in motion. This is meant to stop people from running a "sniffer" or other network eavesdropping method to grab your data as it passes across the network. This MIGHT not be necessary if the BE is encrypted because I believe that decryption occurs AFTER the data reaches the FE file. In which case the network SMB encryption would be overkill, i.e. encrypting an already-encrypted transfer.
Note also that the method requires that the BE file would reside on a system running something like Windows Server 2012. I think all of us would be interested in knowing if you could get Access to work this way because I know the security theory but I have not seen anyone try this method of protection. Part of that might be that the network-level of encryption isn't necessary for encrypted BE cases. Please understand that I
do not know what is transmitted across the connection in this case.
I mention this
only because you are so emphatic about trying to protect your data. It might be more trouble than it is worth even for your extreme needs since it might indeed be a case of overkill. But I would be remiss if I didn't explain it to you as part of your concern over system security.