Disk Encryption/TrueCrypt

Revision as of 21:26, 7 February 2013 by DavidM (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)



TrueCrypt

  • Subsections


Add or edit subsection:

Minimum time60
Maximum time90
Position

4/2

TypeLesson
Section ofDisk Encryption
LangEn
  • Last modified: 18 July 2014 20:59:07


  • русская версия



Installation

TrueCrypt: Install on computer. Re-launch the package file and Extract the files to a USB stick to create a 'traveller disk'. Explain the difference between using an installed and portable version. Open the software folder and upload the necessary localisation.

Trainer's notes: Localisations depend on the Windows ability to handle the language locale. Both installations requires admin privileges on Windows.

Creating a volume

Follow the hands-on guides to create an encrypted volume. Explain the options for selecting the location to store the volume file. Explain obfuscation possibilities for the file extension (Truecrypt only). Mount and dismount the volume.

Trainer's notes: For ease of session, a 100 MB volume size is recommended. Don't get stuck on explaining algorithms and the random number generator. For Truecrypt, draw up a list of common large file extensions, e.g. .mp3, .mpeg, .avi, .iso and so on. Encourage people to use KeePass to create a strong password.

Exercises

  1. Ask the participants to create a document and to save it inside the encrypted volume.
  2. Create a backup of the dismounted volume (file) on the USB memory disk.
  3. Change computers and ask participants to open the newly created document.
  4. Rename the Volume file. Change its extension.


  1. Create a new volume (any size)
  2. Rename the volume file
  3. Organise a competition where participants swap USB memory sticks and try to guess which file is the one containing the Truecrypt volume.

Trainer's notes: Make sure to explain the difference between the softwareand the volume file - you need one to access the other with. Emphasise that when dismounted, the file can easily be deleted.

Last modified on 7 February 2013, at 21:26