.: Contents :.
I. INTRO
- About
II. ENCRYPTING
- Containers
- Drives
- Files
APPENDIX
.: I. INTRO :.
[-=] About [=-]
This is a quick rundown on how to encrypt files, containers, and drives under
Linux. The use of loopback encrypted filesystems and openssl is explained and examples are given. This paper should have you encrypting in no time. The following commands were done running kernel 2.6.9.
.: ENCRYPTING :.
I'll outline how to create encrypted containers and drives using the loopback filesystem support and file encryption via openssl.
[-=] Containers [=-]
This is essentially creating a filesystem
…show more content…
mkfs -t ext2 /dev/loop0
- The first parameter -t ext2 instructs mkfs to format the file with the ext2 filesystem. This is recommended as it allows you to resize the file if need be.
- The last parameter points toward the /dev/loop0 device on which the file was bound.
losetup -d /dev/loop0
- This command detaches and frees the /dev/loop0 device.
Fourth, mounting your encrypted filesystem.
mount -o encryption=aes256 crypto.img crypto_home
- Using the mount the command the first parameter to be entered is encryption=aes256 which will tell the mount command which cipher to use.
The value must be the cipher which you used to encrypt the file.
- The second parameter specifies location of file to mount.
- The third parameter designates the folder on which to mount the file.
Once mounted you can move files into the mount point and create files within it and when you are done simply unmount the file.
[-=] Drives [=-]
First, assuming you formated your drive bind the drive to a loopback device.
losetup -e aes256 /dev/loop0 /dev/sda1
- The parameter -e aes256 at the beginning instructs losetup on which cipher to use. The cipher type is dependent on what your kernel supports.
In this example the AES 256 bit cipher is used but you can use other cipher types such as blowfish interchangeably.
- The second parameter /dev/loop0 is the device to which we bind the drive too. Binding the drive will allow us to format the file with filesystem.
-
Encryption technique is the translation of data into a secret code that will prevent hackers or identity thieves from being able to break or read the data that is sent across the network.
(AES) is a coherent block cipher and this block with size 128 bits. The key length be 128 bits,192 bits , or 256 bits and take the following nomenclature; AES-128, AES-192, and AES-256 . AES128 uses 10 rounds, AES-192 uses 12 rounds, and AES-256 uses 14 rounds [22].
In the Last Week Tonight episode covering the topic of encryption, John Oliver uses a variety of examples, sources, and sarcastic or crude jokes. He defines encryption as a way to keep others from gaining access to all of your personal information on your devices. This includes all of your pictures, banking information, emails, and anything else you wouldn’t want hackers to get ahold of. He demonstrates the importance of encryption by showing a video clip where two hackers were able to shut down a car while it was driving on the interstate. This leads into what Oliver’s argument is mostly about; the conflict between the FBI and Apple over a cell phone. A terrorist’s phone that has been recovered by the FBI cannot be used to obtain potentially
In the workplace today there are many different options for operating systems be they providers of server related services or end-user desktops there is a different Linux distribution for many different applications. There are also a number of advantages and disadvantages to adding onto or switching network operating systems within a company. In the following pages I
Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself.
Linux is a trademark owned by Linus Torvalds [1]. It is an operating system which is powerful, free and inexpensive to own based on UNIX [1]. It is a POSIX-compliant with versions available to install in cell phones, supercomputers and most computing systems [1]. Linux is an open source program as its source code is available to the general public for use and the right to modify from its original design without any charges [1]. New code will be added to the next version made available with Linux if it is accepted as a universal improvement [1]. The code will continue to exist and developed by the user even if the company fails [1]. Moreover, updates for Linux are available every six months [1]. Nowadays, Linux is in constant development by
I’ve been slightly concerned about my rather lax security habits for a year or so. My state escalated from ‘slightly concerned’ to ‘mildly freaked out’ after the reading about the recent LinkedIn and Last.fm breaches. Now is a good time to sort this.
Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked two questions. The first question I asked was do you know what encryption means and the second question I asked was have you ever heard of anybody using encryption. This is a chart of the information I received:
AES faces an ethical dilemma. India’s power plant development team can choose between using expensive technology, meeting U.S. environmental standards, or a cost cutting technology meeting local and less stringent standards yet allowing for contributions to other community needs surrounding the projected plant. “Although many people at AES felt that the company would be “selling out” if it did not maintain its strict commitment to the environment in the narrow senses, others felt that AES should expand its concerns to include people and their quality of life” (AES Global Values, 2000). This presents a major ethical dilemma of whether or not the company should continue its traditional focus on meeting “social responsibility” values through CO2-offset
You can think of network security as an insurance policy in a dangerous new world. In the good old days of centralized processing, is all you had to do was simply lock the computer room door and restrict entrance access. Those days are long gone in light of decentralized processing, the internet and vast communi-cation networks. Personal data and transaction security through networks is of paramount concern when processing through the expanding networks held by government and private enterprises. Network security in itself refers to a collection of tasks or plans that are implemented to ensure data privacy. An overall plan is enacted with security profiles enacted on a multilevel structure allowing various
Cryptography is definitely become a more mainstream topic today. Almost every device in this world is connected to the internet and sharing information. At the same time of the increasing of number in the device, the number of sensitive data in the information shared between devices, application, and server is also increasing in a larger scale. That information must be protected, so that the sensitive data will remain private.
What is Operating System Security, Operating system security is the process of ensuring OS integrity, confidentiality and availability also OS security refers to specified steps used to protect the OS from threats, viruses, worms, malware or remote hacker. OS security include all avoiding-control techniques, which safeguard any computer information from being stolen, edited or deleted if OS security is included. OS security allows different applications and programs to perform required tasks and stop unauthorized interference. OS security may be applied in many ways. We 're going to discuss following topics in this article. A brief description about security and what are the types of encryption and what is Authentication, One Time passwords, Program Threats, System Threats and Computer Security Classifications.
The Linux was originally founded by Linus Torvalds. In 1991, he was a second year computer science student in Finland. He sought after an operating system that was similar to the UNIX system, but both UNIX and the hardware it ran on were excessively expensive. A UNIX version called Minix was available for free, but it did not reasonably meet his needs as it was simply an operating system for students, designed primarily as a teaching tool rather than an industry strength operating system. As a result, Torvalds studied Minix and proceeded to set out to write a new version. After six months of working to produce the new operating system, Torvalds made very little progress toward the utility of the system.
In Windows, you can run lots of different program programs. There are customized programs and off-the-shelf (common) programs. These allow you to do everything from running your bowling league to typing up a correspondence.
A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.