Question

In: Computer Science

Physical theft, Denial of Service, Subversion, Masquerade, Disclosure, and Forgery. For each of these general types...

Physical theft, Denial of Service, Subversion, Masquerade, Disclosure, and Forgery.

For each of these general types of attacks, describe how volume encryption helps resist that attack. Is there any attack that volume encryption might make more likely to occur?  

Solutions

Expert Solution

Volume Encryption: Encrypted volumes allow you to keep many files securely encrypted within one encrypted file volume. Individual files can easily be accessed (assuming the volume is mounted as a drive using the password). Dismount the volume when finished and no one else will be able to access the files in the volume without 'mounting' back to a drive (and to do this the correct Pass Phrase is required)

Physical theft : An adversary gains physical access to a system or device through theft of the item. But even a advisory gains the physical access it will not able to access the files because of volume encryption.

Denial Of Service : Denial of Service (DoS) attacks, in which attackers make it impossible for network users to access information or services by flooding the network with requests that tie up its resources. But that information in case of volume encryption is accessible only if the decryption is possible otherwise it will be not be readable.

Subversion: It refers to a process by which the values and principles of a system in place are contradicted or reversed, in an attempt to transform the established social order and its structures of power, authority, hierarchy. But in case of volume encryption a attacker can't able to change the structure, hierarchy until and unless they know the password.

In masquerade and forgery attacker authenticate themselves as the legitimate user and access the system but even getting the physical access they will not able to access the system information due to volume encryption.

Disclosure as from the name the information accessed by the attacker is disclosed but it's of no use as it is encrypted in volume encryption and hence prevents this attack.

Eavesdropping is one of the attack that might more likely to occur in case of volume encryptions. It arises when we can't always keep our drive physically safe or under appropriate software protection. The volume encryption will not work if the attacker cracks open the computer's case. An attacker can bypass any BIOS or operating system by connecting the hard drive to a different motherboard.


Related Solutions

What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on...
What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on servers?
(TCOs E and F) A Remington School District employee has been charged with theft and forgery...
(TCOs E and F) A Remington School District employee has been charged with theft and forgery for allegedly stealing approximately $72,000 in district funds. Mary Blaner, 51, was charged in District Court with one count of second-degree felony theft and five counts of third-degree felony forgery. She is the second school district employee to be formally charged with stealing from the district. Both individuals were charged in separate and apparently unrelated cases. Blaner, who was the district's payroll clerk, allegedly...
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted...
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. From a high level, a DDoS attack is like a traffic jam clogging up with highway, preventing regular...
Retailing considering the Food and General Merchandise types of retailers (not Service): What type of retailer...
Retailing considering the Food and General Merchandise types of retailers (not Service): What type of retailer do you think is experiencing the biggest growth? Why? What type of retailer do you think is decreasing in popularity? Why? Now thinking of Service Retailers: Why are these types of retailers growing significantly? What specific service retailer do you think does a really good job, meaning it runs very efficiently and takes good care of its customers?
considering the Food and General Merchandise types of retailers (not Service): What type of retailer do...
considering the Food and General Merchandise types of retailers (not Service): What type of retailer do you think is experiencing the biggest growth? Why? What type of retailer do you think is decreasing in popularity? Why? Now thinking of Service Retailers: Why are these types of retailers growing significantly? What specific service retailer do you think does a really good job, meaning it runs very efficiently and takes good care of its customers?
Using about 1000 words or more explain in depth the difference between a denial-of-service attack and...
Using about 1000 words or more explain in depth the difference between a denial-of-service attack and a distributed denial-of-service attack. Research real life stories of the two attacks that happened to a company (or companies) or individuals etc.
6. Information warfare, denial of service, and system tampering are classified under ____________ threat category. 7....
6. Information warfare, denial of service, and system tampering are classified under ____________ threat category. 7. Computer abuse, fraud and theft, falsification, planting of malicious code, and sale of personal information are classified under _______________ threat category. 8. Economic exploitation, information theft, and intrusion of personal privacy are classified under ______________ threat category. 9. Accurate _________________ is the first step towards accomplishing proper planning and accurate budgeting for software development projects. 10. There are ________ major types of cost estimation...
In general, how many types of financial markets exist? Explain each
In general, how many types of financial markets exist? Explain each
• What are the different types of internal controls? Give examples of each. Physical, technical, administrative....
• What are the different types of internal controls? Give examples of each. Physical, technical, administrative. • Know the elements of the COSO internal control framework. How does the COSO framework help in implementing/updating internal controls?
DIFFERENCES BETWEEN GENERAL AND PHYSICAL EXAMINATION IN CLERKSHIP
DIFFERENCES BETWEEN GENERAL AND PHYSICAL EXAMINATION IN CLERKSHIP
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT