Sunday, April 22, 2012

Presentation Slide For IT Student - Securing Data WithTruecrypt

Securing Data With Truecrypt

Objectives

Why Secure and how to
What is encryption
Why encrypt
Truecrypt
Disadvantages of encryption

Why secure data


In the electronic age, information that could otherwise benefit or educate a group or individual can also be used against such groups or individuals.
A letter to your girlfriend may result in a letter from your wife's lawyer.

How to secure data


Hiding
Authenticating
Password and Security
Locking
Destroying
Steganography
Law
Changing form(encryption)‏

What is encryption?


Encryption is the conversion of data into a form, called a cipher text, that cannot be easily understood by unauthorized people.
Encryption is the process of transforming information using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

Simple email

Hello bad guy,

I am giving you a valuable information regarding my company. With that information you can ruin my company.

Regards,
Unaware Employee

Encrypted email
�韨Á¤ ␤W ¦1≤¼ôÓ[Œ\┌LS†Y␌¬üT†O─Œ¾␌YÓ7¤Þ]”ð°T¼“B◆ÜÊ‹┘‹EâÉ┐Ñ,␌<ÁÜÀ⎻¢²P┤Bž¯<ŒŒƒÉ»┴)û
           ßàÇ┼┬ÀN.‹ÁúÍ[≠–ÎQ©íÎ▒ŠQä\ ù-™Z"ghë8¹⎼=Ր˵™\Ø.─5]ÂÀ⎽×Ϗ┬%(;F›MJ¹âZπ␤ ¿'‡æE-= ¶ÒÊïž•"┤9
  ┴┬└┌⎼ÕŽÃð<L £6Å3┘óB”®ÈïXI
␋3þóéÔSKžï┐Ü┬ô▒ýŒ,Ʊ┌ùD±ÃÜ≥▒
Ü‚“€*,QÉ                      ž£6Ù¼ËZ=_-ÒÔ¡*NGY=ƒÜ›„ü/VV─

We need tool so that we cay easily encrypt and decrypt our data
Many commercial and free version available
Built in technology in OS
T r u e C r y p t is free open-source disk encryption software for  Linux, Mac and Windows.


Features of Truecrypt


Creates a virtual encrypted disk within a file and mounts it as a real disk.
Encrypts an entire partition or storage device such as USB flash drive or hard drive.
Encryption is automatic, real-time (on-the-fly) and transparent

Main Features


Provides two levels of plausible deniability, in case an adversary forces you to reveal the password:
1) No TrueCrypt volume can be identified
2) Hidden volume (steganography)   and hidden operating system.

  • Standard Truecrypt volume
  • Hidden volume
Truecrypt can be found at http://www.truecrypt.org/
Truecrypt tutorial can be found athttp://www.truecrypt.org/docs/?s=tutorial http://www.truecrypt.org/docs/

Disadvantages of encryption


Extra processing
Slow access to data
Extra memory consumed
Data can be rendered useless if the key is lost
Forceful retrieve of key makes encryption useless

Question
?

Download the ppt slides for Securing Data With Truecrypt presentation from here.

0 comments:

Post a Comment

Comments are moderated. No spam please.