TRUECRYPT.

Slides:



Advertisements
Similar presentations
Windows 2000 Installation Process. There are three methods available to install the Windows 2000 operating system: Setup boot disks CD – Rom Over-the-network.
Advertisements

Installing DOS and Windows98 under MS Virtual PC.
Packaging a Presentation on a CD, using PowerPoint 2003 Multimedia Services at The Citadel Updated
Introduction to Computer Security USC School of Medicine Office of Information Technology.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Getting Started: Ansoft HFSS 8.0
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Alford Academy Business Education and Computing1 Advanced Higher Computing Based on Heriot-Watt University Scholar Materials File Handling.
HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
POP QUIZ!!! What kind of software is Medisoft? Name ONE of the 4 things that you can do to data in Medisoft. What is the Medisoft Program Date? What key.
CHAPTER © 2013 The McGraw-Hill Companies, Inc. All rights reserved. 2 Introduction to Medisoft.
Secure Off Site Backup at CERN Katrine Aam Svendsen.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Creating And Maintaining A Database. 2 Learn the guidelines for designing databases When designing a database, first try to think of all the fields of.
Chapter 7: Configuring Disks. Configuring File Systems Fat32 –First used with Windows 95 OSR2 –Smaller cluster sizes, more efficient storage up to 32.
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Operating Systems Day 3. Changing Date & Time 1.Double click on digital clock on the notification area of a task bar (Click start button, Click control.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
1 Chapter Overview Managing Data Storage Creating Dynamic Disks Implementing Storage Quotas Managing Compression and Encryption.
Windows XP, Vista (?), 8.1 The lucky ones have an install disk. Bootable floppy from earlier Windows have limited usefulness.
Windows Tutorial 9 Maintaining Hardware and Software
Beyond the Computer Basics Working with applications, files and folders Last Updated: March 2008.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
Configuring the MagicInfo Pro Display
Practical PC, 7th Edition Chapter 5: Organizing Files and Folders
NUMOSS NURUL ‘IZZATI BINTI OTHMAN A
Available Technology  MP3 Players – 25 – Oral Testing, Audio Texts / Books  Presenter Mice – 3 – Oral Presentations  Head Phone Extension Kits – 2 –
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
1. Chapter 9 Maintaining Documents 3 Managing Files As with physical documents, folders, and filing cabinets, electronic files and folders must be well.
University of Management & Technology 1 Operating Systems & Utility Programs.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Chapter 2 Working with Disks and Other Removable Media 2.
Hosted Virtualization Lab Last Update Copyright Kenneth M. Chipps Ph.D.
Installation Overview Lab#2 1Hanin Abdulrahman. Installing Ubuntu Linux is the process of copying operating system files from a CD, DVD, or USB flash.
ASM August 2, Hot off the press AOL planning on ad-supported model "In recognition of the fact that its subscriber-based revenues continue to plummet,
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Project 6 Advanced File and Web Searching. 2 CHAPTER OBJECTIVES  Begin a new file or folder search, save a search, and find a file using a saved search.
RIGHT Mouse Button Formatting Cut Copy Paste Save LEFT Mouse Button MAIN BUTTON Single clicks Double clicks Drag Highlight.
XP New Perspectives on Windows 2000 Professional Windows 2000 Tutorial 2 1 Microsoft Windows 2000 Professional Tutorial 2 – Working With Files.
Microsoft Office XP Illustrated Introductory, Enhanced with Programs, Files, and Folders Working.
CMPF124: Basics Skills for Knowledge Workers Manipulating Windows GUI.
1 Understanding Hardware Profiles A hardware profile stores configuration settings for a set of devices and services. Microsoft Windows 2000 can store.
Windows 2000 Unit A A1 – A24 and Ap1 – Ap3 (Formatting a Disk)
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Start with loading the picture Locate your camera’s USB cable –it looks something like this:
Photo Story. How to use Photo Story Photo Story 3 can be located in the Accessories folder on school computers. You will need to have your pictures already.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 6A Operating System Basics PART I.
XP New Perspectives on Microsoft Windows XP Tutorial 2 1 Microsoft Windows XP Working with Files Tutorial 2.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
XP New Perspectives on Creating Web Pages With Word Tutorial 1 1 Creating Web Pages With Word Tutorial 1.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
An Introduction to Programming with C++1 An Introduction to Control Structures Tutorial 1.
How to Create and Use a VericrYPT CONTAINER
Create Rescue Disk? Windows XP, (Vista) Windows 7, 8 Windows 8.1
Microsoft Windows 7 - Illustrated
Understanding File Management
HOW TO PUT PASSWORD IN WORD, SPREAD SHEET AND DATABASE
Naming, Saving, & Retrieving Files
Microsoft Office Illustrated Introductory, Premium Edition
Create A Virtual Machine
Microsoft Windows 2000 Professional
An Installation Guide of PGP on Windows 2000
VeraCrypt User Guide Cross platform desktop encryption made easy
New Perspectives on Windows XP
Using TrueCrypt 6th May 2009.
Windows Tutorial 9 Maintaining Hardware and Software
Microsoft Office Illustrated Fundamentals
Presentation transcript:

TRUECRYPT

Objective of TrueCrypt Establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention.

Main Features of TrueCrypt Creates a virtual encrypted disk within a file and mounts it as a real disk. Encrypts an entire partition or storage device such as USB flash drive or hard drive. Encrypts a partition or drive where Windows is installed. Encryption is automatic, real-time and transparent. Parallelization and Pipelining allow data to be read and written as fast as if the drive was not encrypted. Encryption can be hardware-accelerated on modern processors. Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden Volume (steganography) and hidden operating sytem.

About TrueCrypt No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc). Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. The whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt.

TrueCrypt with Media Files There is an .avi video file stored on a TrueCrypt volume (therefore, the video file is entirely encrypted). The user provides the correct password (and/or keyfile) and mounts (opens) the TrueCrypt volume. When the user double clicks the icon of the video file, the operating system launches the application associated with the file type – typically a media player. The media player then begins loading a small initial portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) in order to play it. While the portion is being loaded, TrueCrypt is automatically decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the media player. While this portion is being played, the media player begins loading another small portion of the video file from the TrueCrypt-encrypted volume to RAM (memory) and the process repeats. This process is called on-the-fly encryption/decryption and it works for all file types (not only for video files).

How to Create and Use a TrueCrypt Container (Step -1) This is the main window of TrueCrypt. Click Create Volume button.

How to Create and Use a TrueCrypt Container (Step -2) The TrueCrypt Volume Creation Wizard window should appear. Choose where you wish the TrueCrypt volume to be created. A TrueCrypt volume can reside in a file, which is also called container, in a partition or drive. Choose Create an encrypted file container and click on Next button.

How to Create and Use a TrueCrypt Container (Step – 3 & 4) Specify where the TrueCrypt volume (file container) to be created. TrueCrypt container is just like any normal file. It can be, for example, moved or deleted as any normal file. It also needs a filename, which you will choose in the next step. Click Select File and then click Next button Choose Standard TrueCrypt Volume And click on Next button.

How to Create and Use a TrueCrypt Container (Step – 5) You can choose the Encryption Algorithm from the Drop Down List. List of Encryption Algorithm is shown in Figure – 2. By default select AES algorithm and click on Next button. Figure -1 Figure -2

How to Create and Use a TrueCrypt Container (Step – 6 & 7) Specify the size of TrueCrypt container and click on Next button. Enter Container Password and Confirm Password and click on Next button.

How to Create and Use a TrueCrypt Container (Step – 8 & Processing Step) Move the mouse as randomly as possible within the Volume Creation Wizard window at least for 30 seconds. The longer move the mouse, the better. This significantly increases the cryptographic strength of the encryption keys (which increases security). Click Format. Volume creation should begin.

How to Create and Use a TrueCrypt Container (Step -9) TrueCrypt will now create a file. This file will be a TrueCrypt container (it will contain the encrypted TrueCrypt volume). Depending on the size of the volume, the volume creation may take a long time. After it finishes, the following dialog box will appear:

How to Create and Use a TrueCrypt Container (Step - 10) Mount the TrueCrypt Container volume. Click on Select File button.

How to Create and Use a TrueCrypt Container (Step - 11) Click on Mount Button.

How to Create and Use a TrueCrypt Container (Step - 12) Enter the password that you have entered during creation of TrueCrypt container. Then click on OK button.

How to Create and Use a TrueCrypt Container (Step - Final) TrueCrypt will now attempt to mount the volume. If the password is incorrect (for example, if typed it incorrectly), TrueCrypt will notify you and will need to repeat the previous step (type the password again and click OK). If the password is correct, the volume will be mounted.