True Crypt

Essay by philip_iykeUniversity, Bachelor'sA, November 2009

download word file, 2 pages 0.0

Downloaded 2575 times

One major challenge to an encryption system is ensuring that the data that has been previously sent has not been tampered with. Some USB storage devices have a switch placed on the casing of the drive itself that can be adjusted to prevent the host computer from making any modifications to the data on the drive, but many USB flash drives are not equipped with a write-protect mechanism. Write protection enables the repairing of virus infected host computers by the use of storage devices without risking infection of the USB drive by viruses.

A problem inherent in the use of USB drives is that they can be easily lost or misplaced due to their small size. This is a source of worry, especially if the data saved on the drive is sensitive. Consequently, some USB drive manufacturers add encryption hardware to their products, although software encryption systems can also be used effectively.

In this case, TrueCrypt takes care of by its "on-the-fly encryption" that makes the data encrypted/ decrypted automatically even before it is loaded or saved. A password or encryption keys is needed to read the data being stored. Moreover, the encryption is "automatic, real-time and transparent and the virtual encrypted disk mounts as if it is a real disk. It has advance security features such as plausible deniability which is helpful when the sender is confronted by a threatening situation where he/she has to reveal a sacrificiable key." (Good practice in information handling: Data encryption 2009) Another important thing about TrueCrypt is that it is free and open-source encryption software. It can be run on Windows, MAC OS and also Linux. TrueCrypt has its disadvantages, including the 2 listed below1.When data is sent through the network, it will not be encrypted. Nevertheless, it is possible to encrypt the data sent through the use of SSL, TLS, VPN, or other technologies.

2.The shared volume may only be file-hosted. As explained by the TrueCrypt website, the server is usually the one mounted so other computers on the network would not be able to mount the volume. It must also be remembered that files are not necessarily saved on the hard disk and once dismounted, the files cannot be read.

(TrueCrypt Disdavantages 2003)CredantCredant is widely used for file encryption, and is actually a policy-based encryption technology that can service the need for full data encryption such as desktops, laptops, handhelds and external media. Credant offers many advantages such granular control, anti-bridging, anti-hardware keylogger, built-in compliance policies, flexible and intuitive policy management, U3 and auto-run control. According to Technical Specifications of the Credant protector datasheet, anti-bridging meant "blocking WiFi, BlueTooth, modems, or Irda while the PC is connected to the wired local area network (LAN)". Therefore, there is no need to be wary of these peripheral devices since Credant Mobile Guardian will be mainly responsible for blocking any of the hardware. Similarly, the anti-hardware feature would simply block any USB and PS/2 key loggers as specified by the Credant datasheet.

Credant is an administrator's ally since the policies concerning the application of encryption can be easily enforced. "Credant is flexible and adaptive to the environment for it can handle the protection of entire drives as well "be more granular to control certain file types for a certain user or even group." (Good practice in information handling: Data encryption, 2009). More importantly, the IT administrators or the users need not change or adapt to Credant for a seamless integration into their own system. Since there are no special utilities needed, everything flows normally including the established process and procedures.

Works CitedCredant Protector: Technical Specifications. (2009) Retrieved from Good practice in information handling: Data encryption (2009). Retrieved from TrueCrypt Disdavantages (2003). Retrieved from