SlideShare a Scribd company logo
1 of 10
By: Brittany Gilstrap
File Encryption

   File encryption is a method of
    cryptography that can be used for
    individual files, or small groups of files.




                          Pg 386
Common Tools for File
Encryption
   Pretty Good Privacy (PGP) is an encryption
    for files on a Windows system.

     Advantages: Can use RSA or Diffie-Hellman for
     algorithms that are asymmetric, and use IDEA
     for algorithms that are symmetric.

     Disadvantages: Any users sending encrypted
     messages or files to each other must both use
     PGP or it is unable to be read.

                   http://www.ehow.com/list_5924278_disadvantages-
                                 pgp-encryption_.html
Common Tools for File
Encryption
   GNU Privacy Guard is file encryption
    that is open source.

     Advantages: Open source, so skilled users
     are capable of customizing more than other
     kinds.

     Disadvantages: Can only use open-source
     algorithms.


                          Pg 386
File System Encryption

   File System Encryption is a method of
    cryptography used by an operating
    system that will encrypt groups of files.
    This will even “store, retrieve, and
    organize” your files.




                         Pg 386
Common Tools for File System
Encryption
   Microsoft Windows Encrypting File System
    (EFS) helps encrypt for Windows running
    the NTFS file system.

     Advantages: Easily encrypted and decrypted
     when users access or move files. Also, all files
     are encrypted to the system as they are saved.

     Disadvantages: Never encrypt the system
     folders, this will cause performance problems.
     You can not encrypt, and compress a file at the
     same time. Cannot transfer a file to a system
     without NTFS or you will lose your encryption.


                           Pg 386-387
Common Tools for File System
Encryption
  ZFS File System is an encryption tool used
   for the Oracle Solaris ZFS system.

  Advantages: Uses AES encryption with 128,
   192, or 256 key lengths. Uses hardware
   acceleration or software algorithms
   automatically.


  Disadvantages: Oracle only.


                http://download.oracle.com/docs/cd/E19963-
                         01/html/821-1448/gkkih.html
Whole Disk Encryption

   Whole disk encryption is a method of
    cryptography that is used to encrypt
    everything on the disk to prevent any
    threats such as data theft.




                        Pg 387
Common Tools for Whole Disk
Encryption
   Windows BitLocker is hardware-enabled,
    and is used to encrypt anything on the
    computer, either a whole volume or even a
    small file.

     Advantages: Prevents the hard drive to be
     accessed in another computer, and does not
     allow for booting from other operating systems.

     Disadvantages: Windows only.


                            Pg 387
Common Tools for Whole Disk
Encryption
   Truecrypt is a whole disk encryption tool
    that is open-source.

     Advantages: Compatible with all recent
     operating systems. This tool is
     automatic, transparent, and happens in real
     time. Hidden volumes, and hidden operating
     system keep away theft.

     Disadvantages: Downloaded, but other than
     that. Seems like a nice encryption tool.


                         http://www.truecrypt.org/

More Related Content

What's hot

Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmAjay Karri
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
 
Heartbleed Explained
Heartbleed ExplainedHeartbleed Explained
Heartbleed ExplainedMike Chapple
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 

What's hot (20)

Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
The Heartbleed Bug
The Heartbleed BugThe Heartbleed Bug
The Heartbleed Bug
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Heartbleed Explained
Heartbleed ExplainedHeartbleed Explained
Heartbleed Explained
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Classical Encryption
Classical EncryptionClassical Encryption
Classical Encryption
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to File Encryption

Similar to File Encryption (20)

Hard Disk Encryptions
Hard Disk EncryptionsHard Disk Encryptions
Hard Disk Encryptions
 
d-crypt
d-cryptd-crypt
d-crypt
 
Encrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptxEncrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptx
 
Data At Rest Encryption
Data At Rest EncryptionData At Rest Encryption
Data At Rest Encryption
 
List of Software tools for encryption
List of Software tools for encryptionList of Software tools for encryption
List of Software tools for encryption
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Veracrypt
VeracryptVeracrypt
Veracrypt
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Deft
DeftDeft
Deft
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi C
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise Linux
 
13.pptx
13.pptx13.pptx
13.pptx
 
intro to forensics
intro to forensicsintro to forensics
intro to forensics
 
Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

More from brittanyjespersen

Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journalbrittanyjespersen
 
Input, Output, and Procedures
Input, Output, and ProceduresInput, Output, and Procedures
Input, Output, and Proceduresbrittanyjespersen
 
Final Report Summary Group Effort
Final Report Summary Group EffortFinal Report Summary Group Effort
Final Report Summary Group Effortbrittanyjespersen
 

More from brittanyjespersen (6)

Ubuntu VOIP & IM
Ubuntu VOIP & IMUbuntu VOIP & IM
Ubuntu VOIP & IM
 
Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journal
 
Input, Output, and Procedures
Input, Output, and ProceduresInput, Output, and Procedures
Input, Output, and Procedures
 
Final Report Summary Group Effort
Final Report Summary Group EffortFinal Report Summary Group Effort
Final Report Summary Group Effort
 
Project Scope Statement
Project Scope StatementProject Scope Statement
Project Scope Statement
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 

File Encryption

  • 2. File Encryption  File encryption is a method of cryptography that can be used for individual files, or small groups of files. Pg 386
  • 3. Common Tools for File Encryption  Pretty Good Privacy (PGP) is an encryption for files on a Windows system.  Advantages: Can use RSA or Diffie-Hellman for algorithms that are asymmetric, and use IDEA for algorithms that are symmetric.  Disadvantages: Any users sending encrypted messages or files to each other must both use PGP or it is unable to be read. http://www.ehow.com/list_5924278_disadvantages- pgp-encryption_.html
  • 4. Common Tools for File Encryption  GNU Privacy Guard is file encryption that is open source.  Advantages: Open source, so skilled users are capable of customizing more than other kinds.  Disadvantages: Can only use open-source algorithms. Pg 386
  • 5. File System Encryption  File System Encryption is a method of cryptography used by an operating system that will encrypt groups of files. This will even “store, retrieve, and organize” your files. Pg 386
  • 6. Common Tools for File System Encryption  Microsoft Windows Encrypting File System (EFS) helps encrypt for Windows running the NTFS file system.  Advantages: Easily encrypted and decrypted when users access or move files. Also, all files are encrypted to the system as they are saved.  Disadvantages: Never encrypt the system folders, this will cause performance problems. You can not encrypt, and compress a file at the same time. Cannot transfer a file to a system without NTFS or you will lose your encryption. Pg 386-387
  • 7. Common Tools for File System Encryption  ZFS File System is an encryption tool used for the Oracle Solaris ZFS system.  Advantages: Uses AES encryption with 128, 192, or 256 key lengths. Uses hardware acceleration or software algorithms automatically.  Disadvantages: Oracle only. http://download.oracle.com/docs/cd/E19963- 01/html/821-1448/gkkih.html
  • 8. Whole Disk Encryption  Whole disk encryption is a method of cryptography that is used to encrypt everything on the disk to prevent any threats such as data theft. Pg 387
  • 9. Common Tools for Whole Disk Encryption  Windows BitLocker is hardware-enabled, and is used to encrypt anything on the computer, either a whole volume or even a small file.  Advantages: Prevents the hard drive to be accessed in another computer, and does not allow for booting from other operating systems.  Disadvantages: Windows only. Pg 387
  • 10. Common Tools for Whole Disk Encryption  Truecrypt is a whole disk encryption tool that is open-source.  Advantages: Compatible with all recent operating systems. This tool is automatic, transparent, and happens in real time. Hidden volumes, and hidden operating system keep away theft.  Disadvantages: Downloaded, but other than that. Seems like a nice encryption tool. http://www.truecrypt.org/