Attacking and Defending Full Disk Encryption

Attacking and Defending Full Disk Encryption

via YouTube Direct link

Machine Powered Off Full Disk Images Created

12 of 17

12 of 17

Machine Powered Off Full Disk Images Created

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Attacking and Defending Full Disk Encryption

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Attacking & Defending Full Disk Encryption By Tom Kopchak
  2. 2 management
  3. 3 performance implications
  4. 4 data recoveryo
  5. 5 What's Next? memory
  6. 6 Verifying Full Disko Encryption
  7. 7 Trust but Verify
  8. 8 Breaking Encryption Is Hard Look for Weakest Link Think Outside the Box Profit!
  9. 9 Encrypted Laptop STOLEN It's safe, right?
  10. 10 The Solution Forensics Penetration Testing Zero Knowledge vs
  11. 11 Fully Encrypted Administrator Confidence: 100%
  12. 12 Machine Powered Off Full Disk Images Created
  13. 13 Grace period for pre-boot authentication lockout
  14. 14 Downgrade memory Leverage DMA - Exploit OS
  15. 15 Failure of a Encryption? Encryption Did Not Fail! Convenience vs. Security Zero knowledge attack
  16. 16 Understand the Vulnerabilities Physical access Unattended machines Passphrases/decryption keys Memory-resident information
  17. 17 Conclusions FDE is not bulletproof Encryption failure is rare External Factors Understand risks and vulnerabilities, improve where possible

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.