Completed
Machine Powered Off Full Disk Images Created
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Attacking and Defending Full Disk Encryption
Automatically move to the next video in the Classroom when playback concludes
- 1 Attacking & Defending Full Disk Encryption By Tom Kopchak
- 2 management
- 3 performance implications
- 4 data recoveryo
- 5 What's Next? memory
- 6 Verifying Full Disko Encryption
- 7 Trust but Verify
- 8 Breaking Encryption Is Hard Look for Weakest Link Think Outside the Box Profit!
- 9 Encrypted Laptop STOLEN It's safe, right?
- 10 The Solution Forensics Penetration Testing Zero Knowledge vs
- 11 Fully Encrypted Administrator Confidence: 100%
- 12 Machine Powered Off Full Disk Images Created
- 13 Grace period for pre-boot authentication lockout
- 14 Downgrade memory Leverage DMA - Exploit OS
- 15 Failure of a Encryption? Encryption Did Not Fail! Convenience vs. Security Zero knowledge attack
- 16 Understand the Vulnerabilities Physical access Unattended machines Passphrases/decryption keys Memory-resident information
- 17 Conclusions FDE is not bulletproof Encryption failure is rare External Factors Understand risks and vulnerabilities, improve where possible