ENCRYPTING VOLUMES |
CHAPTER 9 |
ABOUT THIS CHAPTER
In this chapter, we look at the problem of protecting an entire storage device, as opposed to protecting individual files. We look at the following:
• Risks and policy alternatives for protecting drive contents
• Block ciphers that achieve high security
• Block cipher encryption modes
• Hardware for volume encryption
• Software for volume encryption
9.1 Securing a Volume
When we examined file systems in Section 5.1, Bob and Tina suspected that their survey report was leaked through file scavenging: Someone looked at the “hidden” places on the hard drive. We can avoid such attacks and protect everything on the hard drive, including the boot blocks, directory entries, and free space, ...
Get Elementary Information Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.