SlideShare a Scribd company logo
1 of 10
By: Brittany Gilstrap
File Encryption

   File encryption is a method of
    cryptography that can be used for
    individual files, or small groups of files.




                          Pg 386
Common Tools for File
Encryption
   Pretty Good Privacy (PGP) is an encryption
    for files on a Windows system.

     Advantages: Can use RSA or Diffie-Hellman for
     algorithms that are asymmetric, and use IDEA
     for algorithms that are symmetric.

     Disadvantages: Any users sending encrypted
     messages or files to each other must both use
     PGP or it is unable to be read.

                   http://www.ehow.com/list_5924278_disadvantages-
                                 pgp-encryption_.html
Common Tools for File
Encryption
   GNU Privacy Guard is file encryption
    that is open source.

     Advantages: Open source, so skilled users
     are capable of customizing more than other
     kinds.

     Disadvantages: Can only use open-source
     algorithms.


                          Pg 386
File System Encryption

   File System Encryption is a method of
    cryptography used by an operating
    system that will encrypt groups of files.
    This will even “store, retrieve, and
    organize” your files.




                         Pg 386
Common Tools for File System
Encryption
   Microsoft Windows Encrypting File System
    (EFS) helps encrypt for Windows running
    the NTFS file system.

     Advantages: Easily encrypted and decrypted
     when users access or move files. Also, all files
     are encrypted to the system as they are saved.

     Disadvantages: Never encrypt the system
     folders, this will cause performance problems.
     You can not encrypt, and compress a file at the
     same time. Cannot transfer a file to a system
     without NTFS or you will lose your encryption.


                           Pg 386-387
Common Tools for File System
Encryption
  ZFS File System is an encryption tool used
   for the Oracle Solaris ZFS system.

  Advantages: Uses AES encryption with 128,
   192, or 256 key lengths. Uses hardware
   acceleration or software algorithms
   automatically.


  Disadvantages: Oracle only.


                http://download.oracle.com/docs/cd/E19963-
                         01/html/821-1448/gkkih.html
Whole Disk Encryption

   Whole disk encryption is a method of
    cryptography that is used to encrypt
    everything on the disk to prevent any
    threats such as data theft.




                        Pg 387
Common Tools for Whole Disk
Encryption
   Windows BitLocker is hardware-enabled,
    and is used to encrypt anything on the
    computer, either a whole volume or even a
    small file.

     Advantages: Prevents the hard drive to be
     accessed in another computer, and does not
     allow for booting from other operating systems.

     Disadvantages: Windows only.


                            Pg 387
Common Tools for Whole Disk
Encryption
   Truecrypt is a whole disk encryption tool
    that is open-source.

     Advantages: Compatible with all recent
     operating systems. This tool is
     automatic, transparent, and happens in real
     time. Hidden volumes, and hidden operating
     system keep away theft.

     Disadvantages: Downloaded, but other than
     that. Seems like a nice encryption tool.


                         http://www.truecrypt.org/

More Related Content

What's hot

What's hot (20)

DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
AES by example
AES by exampleAES by example
AES by example
 
Data encryption
Data encryptionData encryption
Data encryption
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Internet Key Exchange Protocol
Internet Key Exchange ProtocolInternet Key Exchange Protocol
Internet Key Exchange Protocol
 
Cryptography
CryptographyCryptography
Cryptography
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Symmetric & Asymmetric Cryptography
Symmetric & Asymmetric CryptographySymmetric & Asymmetric Cryptography
Symmetric & Asymmetric Cryptography
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Openssl
OpensslOpenssl
Openssl
 

Similar to File Encryption

Similar to File Encryption (20)

Hard Disk Encryptions
Hard Disk EncryptionsHard Disk Encryptions
Hard Disk Encryptions
 
d-crypt
d-cryptd-crypt
d-crypt
 
Encrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptxEncrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptx
 
Data At Rest Encryption
Data At Rest EncryptionData At Rest Encryption
Data At Rest Encryption
 
List of Software tools for encryption
List of Software tools for encryptionList of Software tools for encryption
List of Software tools for encryption
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Veracrypt
VeracryptVeracrypt
Veracrypt
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Deft
DeftDeft
Deft
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi C
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise Linux
 
13.pptx
13.pptx13.pptx
13.pptx
 
intro to forensics
intro to forensicsintro to forensics
intro to forensics
 
Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

More from brittanyjespersen

Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journalbrittanyjespersen
 
Input, Output, and Procedures
Input, Output, and ProceduresInput, Output, and Procedures
Input, Output, and Proceduresbrittanyjespersen
 
Final Report Summary Group Effort
Final Report Summary Group EffortFinal Report Summary Group Effort
Final Report Summary Group Effortbrittanyjespersen
 

More from brittanyjespersen (6)

Ubuntu VOIP & IM
Ubuntu VOIP & IMUbuntu VOIP & IM
Ubuntu VOIP & IM
 
Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journal
 
Input, Output, and Procedures
Input, Output, and ProceduresInput, Output, and Procedures
Input, Output, and Procedures
 
Final Report Summary Group Effort
Final Report Summary Group EffortFinal Report Summary Group Effort
Final Report Summary Group Effort
 
Project Scope Statement
Project Scope StatementProject Scope Statement
Project Scope Statement
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 

File Encryption

  • 2. File Encryption  File encryption is a method of cryptography that can be used for individual files, or small groups of files. Pg 386
  • 3. Common Tools for File Encryption  Pretty Good Privacy (PGP) is an encryption for files on a Windows system.  Advantages: Can use RSA or Diffie-Hellman for algorithms that are asymmetric, and use IDEA for algorithms that are symmetric.  Disadvantages: Any users sending encrypted messages or files to each other must both use PGP or it is unable to be read. http://www.ehow.com/list_5924278_disadvantages- pgp-encryption_.html
  • 4. Common Tools for File Encryption  GNU Privacy Guard is file encryption that is open source.  Advantages: Open source, so skilled users are capable of customizing more than other kinds.  Disadvantages: Can only use open-source algorithms. Pg 386
  • 5. File System Encryption  File System Encryption is a method of cryptography used by an operating system that will encrypt groups of files. This will even “store, retrieve, and organize” your files. Pg 386
  • 6. Common Tools for File System Encryption  Microsoft Windows Encrypting File System (EFS) helps encrypt for Windows running the NTFS file system.  Advantages: Easily encrypted and decrypted when users access or move files. Also, all files are encrypted to the system as they are saved.  Disadvantages: Never encrypt the system folders, this will cause performance problems. You can not encrypt, and compress a file at the same time. Cannot transfer a file to a system without NTFS or you will lose your encryption. Pg 386-387
  • 7. Common Tools for File System Encryption  ZFS File System is an encryption tool used for the Oracle Solaris ZFS system.  Advantages: Uses AES encryption with 128, 192, or 256 key lengths. Uses hardware acceleration or software algorithms automatically.  Disadvantages: Oracle only. http://download.oracle.com/docs/cd/E19963- 01/html/821-1448/gkkih.html
  • 8. Whole Disk Encryption  Whole disk encryption is a method of cryptography that is used to encrypt everything on the disk to prevent any threats such as data theft. Pg 387
  • 9. Common Tools for Whole Disk Encryption  Windows BitLocker is hardware-enabled, and is used to encrypt anything on the computer, either a whole volume or even a small file.  Advantages: Prevents the hard drive to be accessed in another computer, and does not allow for booting from other operating systems.  Disadvantages: Windows only. Pg 387
  • 10. Common Tools for Whole Disk Encryption  Truecrypt is a whole disk encryption tool that is open-source.  Advantages: Compatible with all recent operating systems. This tool is automatic, transparent, and happens in real time. Hidden volumes, and hidden operating system keep away theft.  Disadvantages: Downloaded, but other than that. Seems like a nice encryption tool. http://www.truecrypt.org/