Top-Rated Free Essay
Preview

NT2580 Unit 5 assignment

Good Essays
340 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT2580 Unit 5 assignment
Kurtis Galaba
2/7/14
NT2580 Unit 5 Assignment 1 BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen. Windows 7 extends BitLocker functionality to removable drives, we call that functionality BitLocker to Go. BitLocker to Go gives you the ability to encrypt your thumb drives and even USB hard drives. You even have the ability to enforce BitLocker to Go via Group Policy, this Group Policy can ensure that users can only store corporate data on encrypted drives. BitLocker does not protect the computers contents while Windows is running. BitLocker is built for offline attacks, once the operating system is up and running.

Truecrypt is a source-available freeware application used for on the fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device. Truecrypt supports windows, OS X and Linux operating systems. It currently uses the XTA mode of operation. Truecrypt used LRW mode in versions 4.1 through 4.3a and CBC mode in versions 4.0 and earlier. TrueCrypt supports parallelized encryption for multi-core systems and, under Microsoft Windows, pipelined read/write operations to reduce the performance hit of encryption and decryption. On newer processors supporting the AES-NI instruction set, TrueCrypt supports hardware-accelerated AES to further improve performance. The performance impact of disk encryption is especially noticeable on operations which would normally useDirect Memory Access (DMA), as all data must pass through the CPU for decryption, rather than being copied directly from disk to RAM. TrueCrypt is vulnerable to various known attacks which are also present in other software-based disk encryption software such as BitLocker. To prevent those, the documentation distributed with TrueCrypt requires users to follow various security precautions.[15] Some of those attacks are detailed below.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    6. Enabling Store Passwords Using Reversible Encryption determines whether Windows stores passwords using reversible encryption. Enabling this is essentially the same as storing passwords in plain text which is insecure and not recommended.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pay attention to the suggested corrects details, because if you don’t you’ll not get it. I have no problem with the spelling of “Andrews”. Look at your post when you say address, you brought period(.) then (2014) immediately after Andrews, instead of comma (,). I don’t think is my job to be talking about this minute and infinitesimal detail.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A key reason that the early 3.X and 9.X Windows operating systems were not intended for business use is the fact that they use a FAT file system; which are the only file system that is supported by Windows 9.X. According to Wikipedia (2011), “the FAT file systems have very limited security; every user that has access to a FAT drive also has access to all files on that drive. The FAT file systems provide no access control lists and file-system level encryption like NTFS.”…

    • 608 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Another option is a BitLocker , which is a security feature that allows a user or network administrator to lock hard drives. If Kudler Fine Foods has sensitive corporate data on any hard drives, the user or admin can lock the hard drive with a password so that it cannot be accessed. This adds another layer of protection and ensures that the hard drive simply cannot be pulled out of the computer and attempted to be read as a secondary hard drive on another computer. This is a good feature for protecting data, especially for laptops that will be traveling and could potentially be…

    • 268 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    First download and install TrueCrypt on your computer. After downloading and installing the application plug in your flash drive into your computer and click Create volume on the application. Now select encrypt a non-system partition/drive. Then it will prompt you to select the volume type, select standard Truecrypt volume. Now will be selecting the drive that you want to encrypt so click on select drive button and search for the flash drive. Now it will prompt you to select the type of encryption, this will be up to you; the default option is AES which stands for advanced encryption standard that has been adapted by the U.S.…

    • 564 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This patent covers backup applications that use externally connected USB storage devices such as a hard disk drive/SSD for storing a compressed image backup or a file by-file backup of a Windows system disk. The system incrementally updates these backups, including the system registry, and places this information on the external USB storage device that then becomes bootable by the Windows system.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    AES encryption

    • 782 Words
    • 4 Pages

    4. "Efficient software implementation of AES on 32-bit platforms". Lecture Notes in Computer Science. (2003)…

    • 782 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    In an age where data transmission over the network has become a vital aspect of communication and information sharing it is very essential to ensure robust data security. Keeping the above fact in mind, we aim to enhance the existing security standards by designing a more efficient Encryption Algorithm. In this paper we propose the idea of using a combination of AES-DES and incorporating it in the Feistal structure. Being a hybrid of two powerful encryption techniques, the algorithm would be an efficient and reliable encryption standard.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Safe Travel

    • 732 Words
    • 3 Pages

    Encrypt Your Data: Just in case your laptop should fall into unauthorized hands, you should make sure your hard drive is encrypted. Laptops with Windows Vista Enterprise or Ultimate come equipped with BitLocker drive encryption. If you aren’t using one of these versions of Windows Vista, and your company has not implemented any other sort of enterprise-wide encryption solution, you can use an open source solution such as TrueCrypt to protect your data.…

    • 732 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The two most basic terms related to cryptography are Encryption and Decryption. These terms play a crucial role in bringing up this topic, and have been discussed in detail. The other terms that are crucial related to this topic is Secret Keys and Ciphers (upon which our entire report is based).…

    • 423 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Asafsdfadsf

    • 3457 Words
    • 14 Pages

    bits keys [2, 3, 4, 5, 9, 10, 11, 13]. The most common classification of encryption techniques can be shown in Internet and networks applications are growing very fast, Figure 1. so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. On the other side, those algorithms conCryptography sume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption Protocols Public-key Private-key algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. A comparison has been conducted for those encryption algorithms at different settings for RSA& Others each algorithm such as different sizes of data blocks, difBlock Stream ferent data types, battery power consumption, different key size and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness RC4& Others of each algorithm. AES BlowFish &Others RC6 Keywords: 3DES, AES, blowfish, computer security, DES, encryption techniques, RC2, RC6 Figure 1: Overview of the field of cryptography…

    • 3457 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    Steganography

    • 1450 Words
    • 6 Pages

    Information security is of utmost importance in today’s fast developing era. Information or messages are being exchanged over various types of networks. With the huge growth of computer networks and advancement in technology, a huge amount of information is being exchanged. A large part of this information is confidential or private which increases the demand for stronger encryption techniques. Security…

    • 1450 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    avast and c++

    • 543 Words
    • 3 Pages

    File System Shield — Real-time protection against viruses and other malware threats. Scans files as they run on your computer to keep viruses from being able to execute.…

    • 543 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Bitdefender Total Security is a new antimalware suite which offers extra security and protection against all kinds of malware. It is an award-winning software, which protects every…

    • 797 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Chapter 2

    • 389 Words
    • 2 Pages

    Folder Lock is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs, cable users and hackers.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays