Using TrueCrypt 6th May 2009.

Slides:



Advertisements
Similar presentations
Windows 2000 Installation Process. There are three methods available to install the Windows 2000 operating system: Setup boot disks CD – Rom Over-the-network.
Advertisements

Installing DOS and Windows98 under MS Virtual PC.
TO A USB DEVICE. DATA CAN BE LOST DUE TO POWER SURGES MANUFACTURING DEFECTS HURRICANES/LIGHTENING STRIKES.
HOW TO IMPORT AND EXPORT DATA. Why do I need to use Export/Import? Here are some examples: If you have a laptop that you take home (or have a home version.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
ICONS. Learning Targets  I Can…  Identify the different categories of icons specific to the Windows OS  Explain the function of the icon(s) specific.
eLearning Revolution For All
The Windows Registry Adapted from
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Introduction to Computers II A Presentation of the Elmhurst Public Library.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Chapter 7 Installing and Using Windows XP Professional.
 The operating system is essential for the computer; without it the computer could not work.  The main function of any operating system is being an intermediary.
1 Introducing Windows Backup There are different methods for starting Windows 2000 Backup. Requirements for running Windows 2000 Backup All users can back.
Advanced Topics 8/24/ Objectives In this chapter, – covers some areas that help you effectively design, maintain, and perform some of the more basic.
Introduction to Computers Connie Dalrymple. What is a computer? Sources:
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
TRUECRYPT.
Microsoft Office 2013 ®® Managing Your Files. XP Objectives Explore the differences between Windows 7 and Windows 8 Plan the organization of files and.
Week #7 Objectives: Secure Windows 7 Desktop
How KeePass password safe can save you time and energy
Installing Windows 2000 BY: Joshua Wilburn, Arnol Vaquero.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
TATA Motors Limited Commercial Vehicles Business Unit TML CVBU eLearning Application Installation Guide for application installer and update patches.
Installation Overview Lab#2 1Hanin Abdulrahman. Installing Ubuntu Linux is the process of copying operating system files from a CD, DVD, or USB flash.
Windows Tutorial Common Objects ACOS: 1, 4. Using the Taskbar 1. Using the taskbar, you can switch between open programs and between open documents within.
ENCRYPTION EXERCISE ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………...…... RESEARCH DATA MANAGEMENT TEAM UK DATA.
XP New Perspectives on Windows 2000 Professional Windows 2000 Tutorial 2 1 Microsoft Windows 2000 Professional Tutorial 2 – Working With Files.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Final Union Training TY What’s New In TaxWise Gary Blauth Module NJ 2.3.
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
Instructions.  Open up the letter that Adam has given to you  Format it so it look professional.
Using TrueCrypt with TaxWise How to guarantee security without spending any of AARP’s cash.
File Management In this exercise the A drive is used as an example. If you are using another storage device, substitute that drive letter (D, E, F…) where.
Understand Encryption LESSON 2.5_A Security Fundamentals.
VirtualBox: How to create a Linux Virtual Machine.
Start with loading the picture Locate your camera’s USB cable –it looks something like this:
SQL SERVER 2008 Installation Guide A Step by Step Guide Prepared by Hassan Tariq.
HOW TO INSTALL WINDOWS 7? This step-by-step guide demonstrates how to install Windows 7 Ultimate. The guide is similar for other versions of Windows 7.
Windows Installing or Upgrading to Windows 2000.
Troubleshooting Dashhawk Issues. Here's what you have to do to have the DashHawk run properly Go to the ACTUAL PROGRAM file (not the short cut)
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Introducing Windows 95 Session Two. Today’s Agenda u Formatting Disks u Copying Disks u Mapping Network Drives u Connecting to Network Printers.
How to Create and Use a VericrYPT CONTAINER
Fundamentals of Windows Mouse n 4 Basic Operations: –Pointing –Clicking –Double Clicking –Dragging.
1.5 File Management.
The importance of computer backups
File Share Parameters File share resources can be normal shares, DFS roots, or Dynamic Shares. You configure file share permissions at the same time and.
Getting Started with Application Software
Installation of virtual box
Mobile Device Encryption
European Computer Driving Licence
Information Protection & Cyber Security
3.1 Profibus Card Driver Installation
Creating a Windows Server 2012 R2 Datacenter Virtual machine
Creating a Windows Server 2016 Datacenter Virtual machine
Creating a Windows 7 Professional SP1 Virtual machine
Creating a Windows 10 Virtual machine
Create A Virtual Machine
1. Press the Power button or switch to flip on the printer, if it is turn off. 2. From the Home display screen on the product control panel, click the.
Windows Operating Systems (Cont.)
BASICS 1 Windows XP.
Microsoft Windows 2000 Professional
Computer an Electronic Filing Cabinet
Martus Account Set Up Benetech is a non-profit organization that develops and supports Martus, a secure information management software for human rights.
An Installation Guide of PGP on Windows 2000
VeraCrypt User Guide Cross platform desktop encryption made easy
European Computer Driving Licence
Presentation transcript:

Using TrueCrypt 6th May 2009

Sensitive data data which relates to a living individual who can be identified by that data. strategic planning or financial information Sensitive data now MUST be encrypted if being accessed outside QUB

What is encryption? Data is garbled using a key (usually a password) If data is lost or stolen, it is inaccessible Without the key, no way to access data – so don’t forget your password. Not recommended that you store your ONLY copy of anything important in an encrypted volume

TrueCrypt We will be using TrueCrypt to implement encryption in Psychology Now installed on all computers in Psychology TrueCrypt is available for MacOS Other solutions available e.g. IronKey (but 1GB key costs £60+VAT, 4GB costs £100+VAT)

What to encrypt? Can encrypt entire computer e.g. School laptops in workshop; enter password to enable the computer to boot Do NOT recommend do this with desktop computers Or can encrypt a part of a disk May wish to do this on your desktop computer Recommend you do this on your memory stick

How does TrueCrypt work? It creates an encrypted area inside an ordinary file. This file can even be disguised. File can be on your Desktop or on a memory stick – anywhere you like. When you provide the correct password, the file becomes a volume in My Computer with a drive letter – just like inserting a memory stick. Files that are copied to our from the encrypted volume are encrypted/decrypted on the fly.

VERY IMPORTANT To access an encrypted volume EITHER need TrueCrypt installed (computers in Psychology) OR need to have administrator privileges (home computers, laptops) use on 3rd party e.g. hospital computers would need to be clarified (use IronKey?)

Practical Session I Create an encrypted volume on your USB memory stick or on the computer you’re sitting at. Recommend only encrypt a portion of your memory stick. Rest can be used for non-sensitive unencrypted data.

Select “Create Volume”

Select “Create an encrypted file container”

Select “Standard TrueCrypt volume”

Type or select the name of the file to hold the volume If using a memory stick, make sure it is inserted now Do not use an existing file as a file container as it will be completely overwritten.

Encryption Options Keep the default settings

Enter the size for the new virtual volume – for today, 1GB maximum Ensure that you have enough free space for whatever volume size that you chose. Note that there is a 4GB limit on computers for which you do not have administrative privileges. Also ensure that the file container you are creating is big enough to hold the data you need to encrypt – the container cannot later be resized.

Enter a password Use a long password or phrase that you will remember. Loss of this will make your data permanently inaccessible. Key files provide an extra layer of security but are not required. If you type a short password, a warning will appear.

Final step - format the volume Unless the encrypted volume is larger than 4GB keep the default settings for ‘File system’ and ‘Cluster’. Now move the mouse randomly within the window for about 30 seconds, to generate strong cryptographic keys. Click 'Format'.

Finished

Practical Session II Set up AutoRun on your USB device Makes access to your encrypted volume easier IMPORTANT: this allows you to access your encrypted data if TrueCrypt is not installed but ONLY if you have administrator privileges on that computer.

Traveller Mode “Tools -> Traveller Disk Setup” Insert the USB device containing the encrypted volume Enter or browse to the drive letter of your USB device Clear “Include TrueCrypt Volume Creation Wizard”   Select the “Auto-mount TrueCrypt volume (specified below)” option. In “TrueCrypt volume to mount”, enter the name of file which contains your encrypted volume Click on “Create”.

Using AutoRun Now when you insert your USB device you will normally see a window similar to that below. To access your encrypted volume, select the “Mount TrueCrypt volume” option and enter your password when prompted. If you only wish to access the non-encrypted portion of your USB device, you may click on “Open folder to view files using Windows Explorer”

Practical Session III Using AutoRun to access encrypted data

Mount TrueCrypt volume

Enter password

New drive in Computer window Your encrypted file container will now appear as a separate volume – in this case (G:). “TrueCrypt Traveller Disk (F:)” which confusingly is the drive with the TrueCrypt icon, is unencrypted. “Removable Disk (G:)” with a standard disk icon contains the encrypted data.

Removing the memory stick I Open the Computer window and right-click on the device. First select “Dismount All TrueCrypt Volumes” Then select “Safely Remove” You may now remove the USB device from the computer. If Windows won’t allow you to safely remove the device, go to the TrueCrypt icon, right-click on it and select “Exit”.

Removing the memory stick II First, right-click on the TrueCrypt icon and select “Dismount All Mounted Volumes” Then click on the Safely Remove Hardware icon Safely remove the USB device in the normal way. If Windows won’t allow you to safely remove the device, go back to the TrueCrypt icon, right-click on it and select “Exit”.

Practical Session IV Accessing an encrypted volume without using AutoRun

Open TrueCrypt main window Select any drive letter In ‘Volume’, enter the path to the file containing the virtual volume Click on 'Mount' at the bottom of the window. After entering the password, you encrypted files will now be available. When finished with the volume, select its drive letter again within the TrueCrypt window and the 'Mount' button will become a 'Dismount' button. Click it to release the volume.