Preview

Desktop Support Specialist

Good Essays
Open Document
Open Document
564 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Desktop Support Specialist
Introduction
- Introduce myself and welcome to Encryption – USB/Flash drive
- My background in the IT industry
Body
• Why do we want encrypt our flash drive? You may ask yourself.
• I don’t know about you but I have lost one or two flash drive within the past 2 months and fortunately they did not have important information.
• Don’t get me wrong flash drives are great for transporting files and documents back and forth from office to home. But flash drives are easily forgotten in the USB port and they are small enough to be taken from your pocket or bag unnoticed.
• Due to theft or human is error is very common, the best defense is to encrypt your flash drive. This is the best way to prevent data theft and the best security is to encrypt the data.
• A consultant from eSecurity Planet (a company that provides information security) recommends considering encrypting a flash drive so you will not be vulnerable if you were to lose your flash drive. He also says that it is crucial to have data encryption include a flash drive.
• So let us begin, choosing the right encryption utility can become overwhelming. There are so many like WinEncrypt, My Lockbox, EncryptOnClick are just a few. But we are going to talk about TrueCrypt. TrueCrypt is a free encryption program loaded with powerful features that you can use to protect your flash drive.
• First download and install TrueCrypt on your computer. After downloading and installing the application plug in your flash drive into your computer and click Create volume on the application. Now select encrypt a non-system partition/drive. Then it will prompt you to select the volume type, select standard Truecrypt volume. Now will be selecting the drive that you want to encrypt so click on select drive button and search for the flash drive. Now it will prompt you to select the type of encryption, this will be up to you; the default option is AES which stands for advanced encryption standard that has been adapted by the U.S.



References: http://download.cnet.com/TrueCrypt/3000-2092_4-10527243.html http://www.truecrypt.org/ http://www.hongkiat.com/blog/how-to-encrypt-usb-flash-drive/ http://howto.cnet.com/8301-11310_39-20078979-285/what-to-do-with-your-usb-flash-drive-encrypt-it/

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    Twofish is regarded as one of the fastest of its kind, and ideal for use in both hardware and software environments. Like Blowfish, Twofish is freely available to anyone who wants to use it. As a result, you’ll find it bundled in encryption programs such as PhotoEncrypt, GPG, and the popular open source software TrueCrypt.…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    CHAPTER3 REVEIW

    • 527 Words
    • 3 Pages

    a. The CPU tells the RAM which address holds the data that the CPU wants to read…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    Truecrypt is a source-available freeware application used for on the fly encryption. It can create a virtual encrypted disk within a file or encrypt a partition or the entire storage device. Truecrypt supports windows, OS X and Linux operating systems. It currently uses the XTA mode of operation. Truecrypt used LRW mode in versions 4.1 through 4.3a and CBC mode in versions 4.0 and earlier.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3110 - lab 6

    • 511 Words
    • 3 Pages

    4. What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers.…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are many precautions that can be taken to protect IT systems and data. These are as simple as:…

    • 914 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Another option is a BitLocker , which is a security feature that allows a user or network administrator to lock hard drives. If Kudler Fine Foods has sensitive corporate data on any hard drives, the user or admin can lock the hard drive with a password so that it cannot be accessed. This adds another layer of protection and ensures that the hard drive simply cannot be pulled out of the computer and attempted to be read as a secondary hard drive on another computer. This is a good feature for protecting data, especially for laptops that will be traveling and could potentially be…

    • 268 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    microsoft notes

    • 1216 Words
    • 5 Pages

    A user would like to secure files stored on a hard disk. Which file system should they select to format the disk?…

    • 1216 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    A firewall is software or a device that blocks hackers, viruses, and malware from accessing to your network system. Second, you should create strong passwords that nobody can guess. Third, you can hide your browsing activities from others by opening an Incognito window on Google Chrome, Private Browsing on Firefox, and InPrivate on Internet Explorer. These private windows don't record your browsing history. Fourth, when you are using a public computer, you can use a portable privacy device such as the Ironkey Personal Flash Drive or take Linux OS with you on a flash drive. Ironkey Personal Flash Drive is an encrypted flash drive that stores sensitive data and passwords and they are safe from viruses and malware.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The first thing you need to know about hooking up to a hydrant is it’s the most critical thing at a fire. If you can’t get connected to a hydrant you have no water to put on the fire. So there’s a couple steps to this process. You need to know where your hydrant bag is. This bag includes everything you need to make the connection beside the hose. This include your hydrant wrench, your rubber mallet, your adapter to connect your storks to the hydrant, you got your deuce and a half shutoff, and lastly spanner wrenches.…

    • 833 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Flash Memory

    • 4081 Words
    • 17 Pages

    The Board of Directors, Flash Memory Inc. The Finance Team October 11, 2012 Investment in New Product Line…

    • 4081 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Kahuna Cleaning Supply

    • 914 Words
    • 5 Pages

    use passwords to protect your files and ensure that others are unable to access your work.…

    • 914 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    References: [1]Indiana University. 2011. “How Can I Protect Data on my Mobile Device.” Web. https://kb.iu.edu/d/bcnh.…

    • 1705 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    We all know that any type of USB Mass Storage Device is susceptible to a virus infection. Yes we do have Antivirus,you have [Insert your best bet AV name],but at some time the virus can and will bypass the security measure that have been placed by our security system software. We also have to remember that the av's rely heavily on its database signature of virus. This means if your system is to be infected by a newly crafted virus ,chances are your av won't detect it at all eventhough its equipped with a highly advanced heuristic scanner. Enough with the bull. What i'm really trying to say is how dangerous it is for us to double click/"Open" your pendrive's drive in "My Computer" right after you plugged in your USB storage device. When you double click or "Open" ,you are actually trying to launch the virus itself embedded in the USB storage device or more specifically you are actually excuting the program stated in the file named autorun.inf.example of the content of the autorun.inf file:…

    • 507 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    believe in yourself

    • 288 Words
    • 1 Page

    14- MS-Word provides and option to protect or unprotect your document with the help of password.…

    • 288 Words
    • 1 Page
    Satisfactory Essays