SlideShare a Scribd company logo
1 of 10
By: Brittany Gilstrap
File Encryption

   File encryption is a method of
    cryptography that can be used for
    individual files, or small groups of files.




                          Pg 386
Common Tools for File
Encryption
   Pretty Good Privacy (PGP) is an encryption
    for files on a Windows system.

     Advantages: Can use RSA or Diffie-Hellman for
     algorithms that are asymmetric, and use IDEA
     for algorithms that are symmetric.

     Disadvantages: Any users sending encrypted
     messages or files to each other must both use
     PGP or it is unable to be read.

                   http://www.ehow.com/list_5924278_disadvantages-
                                 pgp-encryption_.html
Common Tools for File
Encryption
   GNU Privacy Guard is file encryption
    that is open source.

     Advantages: Open source, so skilled users
     are capable of customizing more than other
     kinds.

     Disadvantages: Can only use open-source
     algorithms.


                          Pg 386
File System Encryption

   File System Encryption is a method of
    cryptography used by an operating
    system that will encrypt groups of files.
    This will even “store, retrieve, and
    organize” your files.




                         Pg 386
Common Tools for File System
Encryption
   Microsoft Windows Encrypting File System
    (EFS) helps encrypt for Windows running
    the NTFS file system.

     Advantages: Easily encrypted and decrypted
     when users access or move files. Also, all files
     are encrypted to the system as they are saved.

     Disadvantages: Never encrypt the system
     folders, this will cause performance problems.
     You can not encrypt, and compress a file at the
     same time. Cannot transfer a file to a system
     without NTFS or you will lose your encryption.


                           Pg 386-387
Common Tools for File System
Encryption
  ZFS File System is an encryption tool used
   for the Oracle Solaris ZFS system.

  Advantages: Uses AES encryption with 128,
   192, or 256 key lengths. Uses hardware
   acceleration or software algorithms
   automatically.


  Disadvantages: Oracle only.


                http://download.oracle.com/docs/cd/E19963-
                         01/html/821-1448/gkkih.html
Whole Disk Encryption

   Whole disk encryption is a method of
    cryptography that is used to encrypt
    everything on the disk to prevent any
    threats such as data theft.




                        Pg 387
Common Tools for Whole Disk
Encryption
   Windows BitLocker is hardware-enabled,
    and is used to encrypt anything on the
    computer, either a whole volume or even a
    small file.

     Advantages: Prevents the hard drive to be
     accessed in another computer, and does not
     allow for booting from other operating systems.

     Disadvantages: Windows only.


                            Pg 387
Common Tools for Whole Disk
Encryption
   Truecrypt is a whole disk encryption tool
    that is open-source.

     Advantages: Compatible with all recent
     operating systems. This tool is
     automatic, transparent, and happens in real
     time. Hidden volumes, and hidden operating
     system keep away theft.

     Disadvantages: Downloaded, but other than
     that. Seems like a nice encryption tool.


                         http://www.truecrypt.org/

More Related Content

What's hot

Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionRapidSSLOnline.com
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Anas Rock
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmAhmed Raza Shaikh
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsFaisal Shahzad Khan
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Cryptography
CryptographyCryptography
CryptographyAnandKaGe
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
4 أنواع خوارزميات التشفير
4  أنواع خوارزميات التشفير4  أنواع خوارزميات التشفير
4 أنواع خوارزميات التشفيررياض خليفة
 
Data encryption
Data encryptionData encryption
Data encryptionAman Jain
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Encryption technology
Encryption technologyEncryption technology
Encryption technologyNeha Bhambu
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 

What's hot (20)

cryptography
cryptographycryptography
cryptography
 
Symmetric and Asymmetric Encryption
Symmetric and Asymmetric EncryptionSymmetric and Asymmetric Encryption
Symmetric and Asymmetric Encryption
 
Encryption
EncryptionEncryption
Encryption
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cryptography
CryptographyCryptography
Cryptography
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
4 أنواع خوارزميات التشفير
4  أنواع خوارزميات التشفير4  أنواع خوارزميات التشفير
4 أنواع خوارزميات التشفير
 
Data encryption
Data encryptionData encryption
Data encryption
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 

Similar to File Encryption

Similar to File Encryption (20)

Hard Disk Encryptions
Hard Disk EncryptionsHard Disk Encryptions
Hard Disk Encryptions
 
d-crypt
d-cryptd-crypt
d-crypt
 
Encrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptxEncrypted File Services in sustaina.pptx
Encrypted File Services in sustaina.pptx
 
Data At Rest Encryption
Data At Rest EncryptionData At Rest Encryption
Data At Rest Encryption
 
List of Software tools for encryption
List of Software tools for encryptionList of Software tools for encryption
List of Software tools for encryption
 
Staying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption ToolsStaying Safe - Overview of FREE Encryption Tools
Staying Safe - Overview of FREE Encryption Tools
 
Ch11
Ch11Ch11
Ch11
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Veracrypt
VeracryptVeracrypt
Veracrypt
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Deft
DeftDeft
Deft
 
Introduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi CIntroduction to Forensics and Steganography by Pardhasaradhi C
Introduction to Forensics and Steganography by Pardhasaradhi C
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise Linux
 
13.pptx
13.pptx13.pptx
13.pptx
 
intro to forensics
intro to forensicsintro to forensics
intro to forensics
 
Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 

More from brittanyjespersen

Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journalbrittanyjespersen
 
Input, Output, and Procedures
Input, Output, and ProceduresInput, Output, and Procedures
Input, Output, and Proceduresbrittanyjespersen
 
Final Report Summary Group Effort
Final Report Summary Group EffortFinal Report Summary Group Effort
Final Report Summary Group Effortbrittanyjespersen
 

More from brittanyjespersen (6)

Ubuntu VOIP & IM
Ubuntu VOIP & IMUbuntu VOIP & IM
Ubuntu VOIP & IM
 
Incident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase JournalIncident Response & Contingency PlanningCase Journal
Incident Response & Contingency PlanningCase Journal
 
Input, Output, and Procedures
Input, Output, and ProceduresInput, Output, and Procedures
Input, Output, and Procedures
 
Final Report Summary Group Effort
Final Report Summary Group EffortFinal Report Summary Group Effort
Final Report Summary Group Effort
 
Project Scope Statement
Project Scope StatementProject Scope Statement
Project Scope Statement
 
Methods Hackers Use
Methods Hackers UseMethods Hackers Use
Methods Hackers Use
 

File Encryption

  • 2. File Encryption  File encryption is a method of cryptography that can be used for individual files, or small groups of files. Pg 386
  • 3. Common Tools for File Encryption  Pretty Good Privacy (PGP) is an encryption for files on a Windows system.  Advantages: Can use RSA or Diffie-Hellman for algorithms that are asymmetric, and use IDEA for algorithms that are symmetric.  Disadvantages: Any users sending encrypted messages or files to each other must both use PGP or it is unable to be read. http://www.ehow.com/list_5924278_disadvantages- pgp-encryption_.html
  • 4. Common Tools for File Encryption  GNU Privacy Guard is file encryption that is open source.  Advantages: Open source, so skilled users are capable of customizing more than other kinds.  Disadvantages: Can only use open-source algorithms. Pg 386
  • 5. File System Encryption  File System Encryption is a method of cryptography used by an operating system that will encrypt groups of files. This will even “store, retrieve, and organize” your files. Pg 386
  • 6. Common Tools for File System Encryption  Microsoft Windows Encrypting File System (EFS) helps encrypt for Windows running the NTFS file system.  Advantages: Easily encrypted and decrypted when users access or move files. Also, all files are encrypted to the system as they are saved.  Disadvantages: Never encrypt the system folders, this will cause performance problems. You can not encrypt, and compress a file at the same time. Cannot transfer a file to a system without NTFS or you will lose your encryption. Pg 386-387
  • 7. Common Tools for File System Encryption  ZFS File System is an encryption tool used for the Oracle Solaris ZFS system.  Advantages: Uses AES encryption with 128, 192, or 256 key lengths. Uses hardware acceleration or software algorithms automatically.  Disadvantages: Oracle only. http://download.oracle.com/docs/cd/E19963- 01/html/821-1448/gkkih.html
  • 8. Whole Disk Encryption  Whole disk encryption is a method of cryptography that is used to encrypt everything on the disk to prevent any threats such as data theft. Pg 387
  • 9. Common Tools for Whole Disk Encryption  Windows BitLocker is hardware-enabled, and is used to encrypt anything on the computer, either a whole volume or even a small file.  Advantages: Prevents the hard drive to be accessed in another computer, and does not allow for booting from other operating systems.  Disadvantages: Windows only. Pg 387
  • 10. Common Tools for Whole Disk Encryption  Truecrypt is a whole disk encryption tool that is open-source.  Advantages: Compatible with all recent operating systems. This tool is automatic, transparent, and happens in real time. Hidden volumes, and hidden operating system keep away theft.  Disadvantages: Downloaded, but other than that. Seems like a nice encryption tool. http://www.truecrypt.org/