Attacking and Defending Full Disk Encryption
Offered By: YouTube
Course Description
Overview
Syllabus
Attacking & Defending Full Disk Encryption By Tom Kopchak
management
performance implications
data recoveryo
What's Next? memory
Verifying Full Disko Encryption
Trust but Verify
Breaking Encryption Is Hard Look for Weakest Link Think Outside the Box Profit!
Encrypted Laptop STOLEN It's safe, right?
The Solution Forensics Penetration Testing Zero Knowledge vs
Fully Encrypted Administrator Confidence: 100%
Machine Powered Off Full Disk Images Created
Grace period for pre-boot authentication lockout
Downgrade memory Leverage DMA - Exploit OS
Failure of a Encryption? Encryption Did Not Fail! Convenience vs. Security Zero knowledge attack
Understand the Vulnerabilities Physical access Unattended machines Passphrases/decryption keys Memory-resident information
Conclusions FDE is not bulletproof Encryption failure is rare External Factors Understand risks and vulnerabilities, improve where possible
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube