CHAPTER        9


In this chapter, we look at the problem of protecting an entire storage device, as opposed to protecting individual files. We look at the following:

•  Risks and policy alternatives for protecting drive contents

•  Block ciphers that achieve high security

•  Block cipher encryption modes

•  Hardware for volume encryption

•  Software for volume encryption

9.1 Securing a Volume

When we examined file systems in Section 5.1, Bob and Tina suspected that their survey report was leaked through file scavenging: Someone looked at the “hidden” places on the hard drive. We can avoid such attacks and protect everything on the hard drive, including the boot blocks, directory entries, and free space, ...

Get Elementary Information Security now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.