![]() ![]() For the purposes of this example let’s name it contents.tc Make up a filename of your choice, I usually name it contents.tc or. Specify a scratch path where you have sufficient space to hold the 695MB container file.Choose the default “Standard TrueCrypt volume”.Choose the default “Create an encrypted file container”. ![]() Open TrueCrypt and start the Volume Creation Wizard by clicking “Create Volume”.Create an encrypted file-container volume on disk The extra margin of 5MB is used to add some AutoRun machinery to the CD so that when the finished disk is inserted, Windows shell takes you right into password entry for mounting the encapsulated volume.ġ. (You could choose a similar container filesize for a 4.7GB single layer DVD-R or 8.5GB dual layer DVD-R). The gist of the procedure is to create an encrypted file-container volume with TrueCrypt that is just slightly less than the size of the target media. Regulatory authorities in Nevada and Massachusetts just passed laws requiring the mandatory encryption of Social Security numbers, bank account numbers, and credit card numbers when carried on portable storage devices like flash drives, setting a precedent that will likely see legislation nationwide. Data breaches in military, public, and commercial sectors have increasingly been making headlines. Secure portable storage media may even be required for regulatory compliance in many contexts, as when storing sensitive customer data such as Social Security Numbers, credit card numbers, or health records. ![]() Whoever snags it will be the proud new owner of a nice pile of random data that, unless they have 5,000 years and a supercomputer, is totally opaque to them. They are effective against the risk of general theft from the premises, the risk of interception in transport, the risk of disclosure to an untrusted agent in a bailment situation as when data vaulting, the risk of corporate espionage, jealous lovers, the IRS, you name it. This is a wide open security gap.Įncrypted CDs close this gap in an airtight way. ![]() Just like that, he has unrestricted access to its contents without ever having to defeat any defenses. Later, when you’re not looking, a bad guy snatches this CD and makes off with it. You place it on your desk, or in a spindle in a drawer, or in your car, or in a box to take to the post office. Suppose, though, that you then burn some important documents (lets say financial, tax, or customer records or the blueprints to a sensitive project) from your carefully protected computer to a plain old data CD. Why encrypt a CD? Well, think of it this way: You take a good deal of trouble to protect the data on your computer from disclosure, using access controls like login passwords, software countermeasures to protect against infection and intrusion, maybe you have even followed my advice and implemented Full Disk Encryption. I am currently using TrueCrypt‘s encrypted file-container volume capabilities to create encrypted CD-R’s and USB memory sticks both as part of my own regular secure backup and data vaulting operations and in the implementation of secure backup and data portability solutions for my customers. But Full Disk Encryption is just scratching the surface of what can be done the concept can and should be extended to all types of storage media, including portable media. I previously discussed the merits of disk encryption as a countermeasure against the physical theft of portable computers and the leakage of private and confidential records that could ensue. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |