ENCRYPTING VOLUMES |
CHAPTER 9 |
ABOUT THIS CHAPTER
In this chapter, we look at the problem of protecting an entire storage device, as opposed to protecting individual files. We look at the following:
• Risks and policy alternatives for protecting drive contents
• Block ciphers that achieve high security
• Block cipher encryption modes
• Hardware for volume encryption
• Software for volume encryption
9.1 Securing a Volume
When we examined file systems in Section 5.1, Eve had asked to borrow a USB drive from which all data had been deleted. Eve could have tried to recover private bookkeeping files from the drive. We can avoid such risks and protect everything on the drive, including the boot blocks, directory entries, and free space, ...
Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.