SlideShare a Scribd company logo
Morten Bo Nielsen – mon@eal.dk 1/7
Encryption of storage
ITT2 ITS security
2014S
Morten Bo Nielsen – mon@eal.dk 2/7
What does it do?
How does it do it?
Software/hardware?
(why and where is the exercise for you)
Encryption (of storage)
Morten Bo Nielsen – mon@eal.dk 3/7
Exercise 1 – To use or not to use?
Architect company - 30 people
● Decide on a scenario (an attack) where full disk encryption is
relevant
● Evaluate treats, vulnerabilities, attack, impact, likelihood, risk
● Should they have full disk encryption?
● What is your recommendation?
● State your assumption
Morten Bo Nielsen – mon@eal.dk 4/7
Exercise 1 – To use or not to use?
30 min, 5 slides
very limited amount of text
Present to other group
Maybe on class if you want
Morten Bo Nielsen – mon@eal.dk 5/7
Options
File- or directory based
Partitions
(USB, /home, loopback devices)
eCryptfs and dm-crypt:
http://thesimplecomputer.info/encrypt-your-linux-home-folder-2-ways-and-10-steps
Truecrypt
https://help.ubuntu.com/community/TrueCrypt
Morten Bo Nielsen – mon@eal.dk 6/7
Assignment 2: Encrypt something
● Set up encrypted USB stick
● On linux
● Must work on your own machine
● Test on others also
● Is it user friendly?
● Upload or link to a document or blog entry describing
your efforts.
Morten Bo Nielsen – mon@eal.dk 7/7
Credits & licences
● Content by Morten Bo Nielsen
License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0
Unported License. (http://creativecommons.org/licenses/by-nc-sa/3.0/)
● EAL logo might be an issue, please check before you use it

More Related Content

More from Morten Nielsen

Itt3 virtual machines
Itt3 virtual machinesItt3 virtual machines
Itt3 virtual machines
Morten Nielsen
 
Itt1 sd requirements
Itt1 sd requirementsItt1 sd requirements
Itt1 sd requirements
Morten Nielsen
 
Itt1 sd uml and oo
Itt1 sd uml and ooItt1 sd uml and oo
Itt1 sd uml and oo
Morten Nielsen
 
Itt3 its social engineering
Itt3 its social engineeringItt3 its social engineering
Itt3 its social engineeringMorten Nielsen
 
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpMorten Nielsen
 
ITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpMorten Nielsen
 
Itet2 its social engineering
Itet2 its social engineeringItet2 its social engineering
Itet2 its social engineeringMorten Nielsen
 
Itet2 its counter recon
Itet2 its counter reconItet2 its counter recon
Itet2 its counter reconMorten Nielsen
 
Itet2 its anatomy
Itet2 its anatomyItet2 its anatomy
Itet2 its anatomy
Morten Nielsen
 
Itet2 its authorative sources
Itet2 its authorative sourcesItet2 its authorative sources
Itet2 its authorative sourcesMorten Nielsen
 
Its presentation
Its presentationIts presentation
Its presentation
Morten Nielsen
 

More from Morten Nielsen (17)

Itt3 virtual machines
Itt3 virtual machinesItt3 virtual machines
Itt3 virtual machines
 
Itt1 sd requirements
Itt1 sd requirementsItt1 sd requirements
Itt1 sd requirements
 
Itt1 sd uml and oo
Itt1 sd uml and ooItt1 sd uml and oo
Itt1 sd uml and oo
 
Itt3 its acl
Itt3 its aclItt3 its acl
Itt3 its acl
 
Itt3 its social engineering
Itt3 its social engineeringItt3 its social engineering
Itt3 its social engineering
 
Itet3 its forensics
Itet3 its forensicsItet3 its forensics
Itet3 its forensics
 
Diagram cookbook
Diagram cookbookDiagram cookbook
Diagram cookbook
 
ITET3 Networking P2P
ITET3 Networking P2PITET3 Networking P2P
ITET3 Networking P2P
 
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odpITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odp
 
ITET1 Routing Application layer.odp
ITET1 Routing Application layer.odpITET1 Routing Application layer.odp
ITET1 Routing Application layer.odp
 
ITET3 ITS governance
ITET3 ITS governanceITET3 ITS governance
ITET3 ITS governance
 
Routing vlans
Routing vlansRouting vlans
Routing vlans
 
Itet2 its social engineering
Itet2 its social engineeringItet2 its social engineering
Itet2 its social engineering
 
Itet2 its counter recon
Itet2 its counter reconItet2 its counter recon
Itet2 its counter recon
 
Itet2 its anatomy
Itet2 its anatomyItet2 its anatomy
Itet2 its anatomy
 
Itet2 its authorative sources
Itet2 its authorative sourcesItet2 its authorative sources
Itet2 its authorative sources
 
Its presentation
Its presentationIts presentation
Its presentation
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Itt2 its encrypted storage

  • 1. Morten Bo Nielsen – mon@eal.dk 1/7 Encryption of storage ITT2 ITS security 2014S
  • 2. Morten Bo Nielsen – mon@eal.dk 2/7 What does it do? How does it do it? Software/hardware? (why and where is the exercise for you) Encryption (of storage)
  • 3. Morten Bo Nielsen – mon@eal.dk 3/7 Exercise 1 – To use or not to use? Architect company - 30 people ● Decide on a scenario (an attack) where full disk encryption is relevant ● Evaluate treats, vulnerabilities, attack, impact, likelihood, risk ● Should they have full disk encryption? ● What is your recommendation? ● State your assumption
  • 4. Morten Bo Nielsen – mon@eal.dk 4/7 Exercise 1 – To use or not to use? 30 min, 5 slides very limited amount of text Present to other group Maybe on class if you want
  • 5. Morten Bo Nielsen – mon@eal.dk 5/7 Options File- or directory based Partitions (USB, /home, loopback devices) eCryptfs and dm-crypt: http://thesimplecomputer.info/encrypt-your-linux-home-folder-2-ways-and-10-steps Truecrypt https://help.ubuntu.com/community/TrueCrypt
  • 6. Morten Bo Nielsen – mon@eal.dk 6/7 Assignment 2: Encrypt something ● Set up encrypted USB stick ● On linux ● Must work on your own machine ● Test on others also ● Is it user friendly? ● Upload or link to a document or blog entry describing your efforts.
  • 7. Morten Bo Nielsen – mon@eal.dk 7/7 Credits & licences ● Content by Morten Bo Nielsen License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. (http://creativecommons.org/licenses/by-nc-sa/3.0/) ● EAL logo might be an issue, please check before you use it