YoVDO

Attacking and Defending Full Disk Encryption

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Data Security Courses Forensics Courses

Course Description

Overview

Explore full disk encryption vulnerabilities and defense strategies in this 53-minute conference talk from BSidesLV 2013. Delve into management, forensics, memory verification, and encryption deployment techniques. Examine real-world scenarios, including a two-story family case and breakthrough methods for breaking encryption. Learn about user convenience settings, physical access risks, and the balance between usability and security. Discover best practices for preboot authentication, disabling DMA interfaces and standby modes, password reset policies, and backup strategies. Gain insights on independent verification and engage in a Q&A session to enhance your understanding of full disk encryption security.

Syllabus

Introduction
Overview
Management
Forensics
Memory
Verification
Encryption Deployment
Breaking Encryption
TwoStory Family
The Scenario
The Real Test
Breakthrough
What is the passphrase
User convenience setting
Full disk encryption failure
Physical access
Usability vs security
Preboot authentication
Disable DMA interfaces
Disable standby
Password resets
Backups
Independent Verification
Conclusions
Questions


Taught by

BSidesLV

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network