StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Encryption System: TrueCrypt - Assignment Example

Cite this document
Summary
In the paper “Encryption System: TrueCrypt” the author analyzes the system TrueCrypt, which takes care of by its “ on-the-fly encryption” that makes the data encrypted/decrypted automatically even before it is loaded or saved. A password or encryption keys are needed to read the data being stored…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Encryption System: TrueCrypt
Read Text Preview

Extract of sample "Encryption System: TrueCrypt"

Another important thing about TrueCrypt is that it is a free and open-source encryption software. This can run on Windows, MAC OS, and even Linux.However, TrueCrypt has its disadvantages too. The website Truecrypt.org ( 2009) listed two major disadvantages, namely :1. When data is sent through the network, it will not be encrypted. Nevertheless, it is possible to encrypt the data sent through the use of SSL, TLS, VPN, or other possible technologies.2. The shared volume may only be file-hosted.

As explained by the TrueCrypt website, the server is usually the one mounted so other computers on the network would "will not be able to mount the volume". It must also be remembered that files are not necessarily saved on the hard disk and once dismounted, the files cannot be read.Another popular file encryption software manufactured by Credant is Credant Mobile Guardian which is actually as policy-based encryption technology that can serve the need for full data encryption such as desktops, laptops, handhelds, and external media.

Credant offers many advantages such as granular control, anti-bridging, anti-hardware keylogger, built-in compliance policies, flexible and intuitive policy management, U3 and auto-run control. According to Technical Specifications of the Credant protector datasheet, anti-bridging meant " blocking WiFi, BlueTooth, modems, or Irda while the PC is connected to the wired local area network ( LAN)". Therefore, there is no need to be wary of these peripheral devices since Credant Mobile Guardian will be mainly responsible for blocking any of this hardware.

Similarly, the anti-hardware feature would simply block any USB and PS/2 keyloggers as specified by the Credant datasheet.Credit is an administrator's ally since the policies concerning the application of encryption can be easily enforced. Credit is flexible and adaptive to the environment for it can handle the protection of entire drives as well " be more granular to control certain file types" for a certain user or even group ( Becta.org,2009). More importantly, the IT administrators or the users need not change or adapt to Credant for seamless integration into their own system.

Since there are no special utilities needed, everything flows normally including the established process and procedures.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Encryption System: TrueCrypt Assignment Example | Topics and Well Written Essays - 516 words, n.d.)
Encryption System: TrueCrypt Assignment Example | Topics and Well Written Essays - 516 words. Retrieved from https://studentshare.org/statistics/1513990-free-encryption-for-thumb-drives-truecrypt
(Encryption System: TrueCrypt Assignment Example | Topics and Well Written Essays - 516 Words)
Encryption System: TrueCrypt Assignment Example | Topics and Well Written Essays - 516 Words. https://studentshare.org/statistics/1513990-free-encryption-for-thumb-drives-truecrypt.
“Encryption System: TrueCrypt Assignment Example | Topics and Well Written Essays - 516 Words”, n.d. https://studentshare.org/statistics/1513990-free-encryption-for-thumb-drives-truecrypt.
  • Cited: 0 times

CHECK THESE SAMPLES OF Encryption System: TrueCrypt

Universal Plug and Play and Its Weaknesses

The assignment "Universal Plug and Play and Its Weaknesses" investigated that many routers are still shipped with grave security bugs, new exploits are coming into the fame where security flaws in Universal Plug and Play devices are turning up into dangerous issues for the systems.... hellip; One of the main weaknesses of universal plug and play devices is that trust on all other communicating devices which in most cases are not trustworthy....
12 Pages (3000 words) Assignment

Communication Technology Design for Confidentiality and Quality Monitoring of CV Service

Ciphertext is not understandable unless it is decrypted History tells us that even during the time of Julius Ceasar a method of encryption was already being used in military communications to prevent the enemy from discovering battle plans.... hellip; encryption is the conversion of data into a form called ciphertext.... Ciphertext is not understandable unless it is decrypted History tells us that even during the time of Julius Ceasar a method of encryption was already being used in military communications to prevent the enemy from discovering battle plans (Mycrypto....
6 Pages (1500 words) Essay

SQL&Security

A tool such as truecrypt provides encryption solutions in the windows platform.... When the characters ‘=' are input in the username text box, the results is the contents of all the usernames that can access the system.... In asymmetric encryption, on the other hand, two keys are used.... In this encryption exchanging keys is not necessary.... encryption changes plain text data into cipher text which is unreadable by unauthorized people (Litchfield, 2003)....
2 Pages (500 words) Assignment

Encryption of Data at Rest and in Transit - OpenSSL and Disk Utility

The type of encryption technology that is applied to data at rest mainly depends upon four factors, the data that needs to be protected, the size of the data, the environment in which the data is located and the main threats that are faced by the system.... The paper "encryption of Data at Rest and in Transit - OpenSSL and Disk Utility " states that encryption software and applications such as OpenSSL and Disk Utility encrypt data with complex keys in much smaller time making sure that deciphering texts is much more difficult for an unauthorized user....
9 Pages (2250 words) Essay

Symmetric Encryption Algorithms

This assignment "Symmetric encryption Algorithms" discusses Stream Ciphers as asymmetric encryption algorithm that encrypts the bits of data and information.... Additionally, this type of encryption is performed on one bit at a time (or occasionally 1 byte at a time) of data at some particular time.... If the similar encryption keystream is utilized a number of times; some types of attacks are able to reveal certain data and information (Network Sorcery, Inc....
6 Pages (1500 words) Assignment

The Importance of Information Security

This research paper "The Importance of Information Security" discusses the problem of privacy in our everyday life.... Information technology is not entirely a technological issue; it has more to do with the administration of an organization.... Therefore, it is very important for an organization....
14 Pages (3500 words) Research Paper

Encryption of Video over WiFi

Furthermore, other systems like the Chaotic system and the frequency domain algorithms have since been developed (Talewad, 2013 pp.... This coursework "encryption of Video over WiFi" describes aspects of the process of data transformation.... This paper outlines background of video encryption, types of encryption algorithms, the encryption proccess, artificial neural networks,  the reuslts of video encryption....
7 Pages (1750 words) Coursework

Attacking Cryptography

In this case, we shall be more concerned with a particular application “truecrypt” and how Charlie can devise different ways of accessing data encrypted using the AES algorithm found in the program from Alice's laptop in the workspace.... truecrypt is a free encryption application that supports Windows, Linux, and Mac operating systems.... There is no foolproof method of protecting data, thus it is necessary for people using truecrypt like Alice or other programs like PGP to find additional ways of protecting their information....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us