Chapter 15 - 02 - Discuss Various Data Security Controls PDF

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Summary

This document discusses various data security controls, including disk encryption and its tools, like VeraCrypt, BitLocker, FileVault, and more. It details implementing built-in file system-level encryption in Windows.

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Data Security Disk Encryption Tools = VeraCrypt = VeraCrypt is a software for establishing and maintaining an on-the-flye (data storage device SCTIPINE " ¢ L) BitLocker Drive Encryption On-the-fly encryption means that data is automatically encrypted ht...

Certified Cybersecurity Technician Exam 212-82 Data Security Disk Encryption Tools = VeraCrypt = VeraCrypt is a software for establishing and maintaining an on-the-flye (data storage device SCTIPINE " ¢ L) BitLocker Drive Encryption On-the-fly encryption means that data is automatically encrypted https://docs.microsoft.com immediately before it is saved and decrypted immediately after it is loaded, without any user intervention w VeaCrypt Volumes Dree —~ Sysem Tovortes Tockh Settings Vo Sae. - Melp Eno pter kg Ow FinalCrypt. Homepage https://www.finalcrypt.org Ty :f Seqrite Encryption Manager - https://www.segrite.com - -2 FileVault o https://support.opple.com vdare \C T e E s ety Vokme Bt Mt Do Mhate Tock. Sect Dpace. Orart A Gilisoft Full Disk Encryption ot http://www.gilisoft.com hitps//www.verocrypt fr ¢ Disk Encryption Tools The common goal of disk encryption tools is to encrypt a disk partition to provide confidentiality to the information stored on it. Some disk encryption tools are discussed below. VeraCrypt Source: https://www.veracrypt.fr VeraCrypt is a software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted just before it is saved and decrypted just after it is loaded without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. The entire encrypted (e.g., file names, folder names, free space, metadata, etc.). file system is Files can be copied to and from a mounted VeraCrypt volume just like they are copied to/from any normal disk (e.g., by simple drag-and-drop operations). Files are automatically decrypted on the fly (in memory/RAM) while they are read or copied from an encrypted VeraCrypt volume. Similarly, files that are written or copied to the VeraCrypt volume are automatically encrypted on the fly (just before they are written to the disk) in RAM. Module 15 Page 1781 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security % VeraCrypt Volumes — System Drive Favorites Tools Settings Help Volume X Homepage Size Encryption Algorithm Type A =)A: B2 =)l - J: =)K: —)L2 ) M: Create Volume Volume Properties... Select File... ~ w [ Vet (7] Never save history I Wipe Cache | VolumeTools... | S SelectDevice... | Figure 15.18: Screenshot of VeraCrypt Some additional disk encryption tools are as follows: = BitLocker Drive Encryption (https.//docs.microsoft.com) = FinalCrypt (https://www.finalcrypt.org) = Seqrite Encryption Manager (https.//www.seqrite.com) = FileVault (https.//support.apple.com) = Gilisoft Full Disk Encryption (http.//www.gilisoft.com) Module 15 Page 1782 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Data Security Exam 212-82 File Level Encryption: Implementing Built-in File System-level Encryption on Windows The Encrypting File System (EFS) provides file 2. system-level encryption in Windows Advanced Attributes X Choose the settings you want for this folder, " H When you dick OK or Apply on the Propertes dialog, you will be asked if you want the changes to affect al subfoiders and files aswel. ‘ Archive and Index attributes [ Folder i ready for archving [ Alow fies in this folder to have contents indexed in addition to fie propertes Compress or Enaypt attrbutes [[] Compress contents to save dsk space [E&wm:cm:msmsewedau Copyright © by File Level Encryption: Implementing Windows The Encrypting File System from Windows ] Detads EC-Council. AN Rights Reserved. Reproductionis Strictly Prohibited. Built-in File System-level Encryption on (EFS) provides file system-level encryption in Windows 2000), except the home (starting version. The user needs to enable this feature on a specific file, directory, or drive. EFS protects the confidential information from unauthorized users who have physical access to a computer. File Encryption with EPS Using Command Prompt = Right-click on the Start button and select Command = Type the following command: Prompt (Admin). cipher /e “" = Enter the file path with extension and hit Enter. C:\Windows\system32\cmd.exe c:\Windows\System32>cipher Encrypting files in Sample.txt 1 file(s). /e (m] X "d:\Demo\Sample.txt" d:\Demo\ [0K] [or directorie(s)] within 1 directorie(s) were encrypted. Converting files from plaintext to ciphertext may leave sections of old plaintext on the disk volume(s). It is recommended to use command CIPHER /W:directory to clean up the disk after all converting is done. c:\Windows\System32> Figure 15.19: File encryption with EPS Module 15 Page 1783 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security To enable EPS Using Advanced Attributes in a Selected File/Folder = Select the file for encryption using EFS. » Right-click on the file and select Properties. + Local Disk (D) » Demo Name Samy* Date modiied Ty P Te Print Edit A AxCrypt > {3 Scan with Windows Defender... & Share Open with 3 Add to archive... n Add to "Sample.rar” > £33 Compress and email... B3 Compress to "Samplerar” and email Restore previous versions Send to > Cut Copy 4 Creste shortcut Delete Rename File ownership ’Q Mark > a3 trusted Properties Figure 15.20: Screenshot of Selecting Properties = (Click Advanced ~ Sample Properties X General Securty Detads Previous Versions 5 Typeof fle: [ | Text Document (bat) Openswth: ]| Notepad Location D:\Demo Size Sbytes (3 bytes) Szeondsk: 4.00 KB (4,056 bytes) Created 07 February 2020, 17:23.59 Modfied 07 February 2020, 17:28:26 Accessed: 07 February 2020, 17.28:26 Atrbtes: [JReadonly Change... [[]Hidden Advanced... Figure 15.21: Choosing Advanced Option Module 15 Page 1784 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Data Security = Exam 212-82 Check the box Encrypt content to secure data and click OK Advanced Attributes E X Choose the settings you want for this folder. When you dick OK or Apply on the Properties dialog, you will be asked if you want the changes to affect all subfolders and files as well, Archive and Index attributes Folder is ready for archiving Allow files in this folder to have contents indexed in addition to file properties Compress or Encrypt attributes [C] compress contents to save disk space [ Encrypt contents to secure data ] |. Details e Figure 15.22: Selecting Encrypt Content to Secure Data = Click Apply. A box will appear with the option to encrypt the file only or encrypt the file and its parent folder. Select as per requirements, and click OK Encryption Warning. X You are encrypting a file that is in an unencrypted folder, If this file is modified, the editing software might store a temporary, unencrypted, copy of the file. To ensure that files created in the parent folder are encrypted, encrypt the parent folder. What do you want to do? (®) Encrypt the file and its parent folder (recommended) (O Encrypt the file only [CJ always encrypt only the file E Cancel ‘ Figure 15.23: Encryption Warning Module 15 Page 1785 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Data Security Exam 212-82 File Encryption Tools Advanced Encryption Package is a file encryption software for Windows 10, 8, and 7. It uses strong and proven algorithms to protect sensitive documents 9 x nter Passmens B. N = Algenthm m Patdie ol ooty BONRH-s {ohonce 2;‘(;-:_’ the Gocmert Fassard pastsced and the SeEnaron Fokder TROE you st Rhl :‘:":: : — \parglectrel v ' Cryptomator https://cryptomator.org y Cobotn 58 eunctatio after oot XN Open derypted Bt dter ety sctar Thes wall

Use Quizgecko on...
Browser
Browser