Главная
Study mode:
on
1
Attacking & Defending Full Disk Encryption By Tom Kopchak
2
management
3
performance implications
4
data recoveryo
5
What's Next? memory
6
Verifying Full Disko Encryption
7
Trust but Verify
8
Breaking Encryption Is Hard Look for Weakest Link Think Outside the Box Profit!
9
Encrypted Laptop STOLEN It's safe, right?
10
The Solution Forensics Penetration Testing Zero Knowledge vs
11
Fully Encrypted Administrator Confidence: 100%
12
Machine Powered Off Full Disk Images Created
13
Grace period for pre-boot authentication lockout
14
Downgrade memory Leverage DMA - Exploit OS
15
Failure of a Encryption? Encryption Did Not Fail! Convenience vs. Security Zero knowledge attack
16
Understand the Vulnerabilities Physical access Unattended machines Passphrases/decryption keys Memory-resident information
17
Conclusions FDE is not bulletproof Encryption failure is rare External Factors Understand risks and vulnerabilities, improve where possible
Description:
Explore the intricacies of full disk encryption in this conference talk that delves into attack vectors and defense strategies. Learn about management and performance implications, data recovery techniques, and the importance of verifying encryption effectiveness. Discover the vulnerabilities associated with physical access, unattended machines, and memory-resident information. Examine real-world scenarios, including stolen encrypted laptops and zero-knowledge attacks. Gain insights into forensic approaches, penetration testing methodologies, and the delicate balance between convenience and security. Understand why encryption failure is rare but not impossible, and how to improve overall system security by addressing external factors and potential weaknesses.

Attacking and Defending Full Disk Encryption

Add to list