Completed
Fully Encrypted Administrator Confidence: 100%
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Attacking and Defending Full Disk Encryption
Automatically move to the next video in the Classroom when playback concludes
- 1 Attacking & Defending Full Disk Encryption By Tom Kopchak
- 2 management
- 3 performance implications
- 4 data recoveryo
- 5 What's Next? memory
- 6 Verifying Full Disko Encryption
- 7 Trust but Verify
- 8 Breaking Encryption Is Hard Look for Weakest Link Think Outside the Box Profit!
- 9 Encrypted Laptop STOLEN It's safe, right?
- 10 The Solution Forensics Penetration Testing Zero Knowledge vs
- 11 Fully Encrypted Administrator Confidence: 100%
- 12 Machine Powered Off Full Disk Images Created
- 13 Grace period for pre-boot authentication lockout
- 14 Downgrade memory Leverage DMA - Exploit OS
- 15 Failure of a Encryption? Encryption Did Not Fail! Convenience vs. Security Zero knowledge attack
- 16 Understand the Vulnerabilities Physical access Unattended machines Passphrases/decryption keys Memory-resident information
- 17 Conclusions FDE is not bulletproof Encryption failure is rare External Factors Understand risks and vulnerabilities, improve where possible