In: Computer Science
Physical theft, Denial of Service, Subversion, Masquerade, Disclosure, and Forgery.
For each of these general types of attacks, describe how volume encryption helps resist that attack. Is there any attack that volume encryption might make more likely to occur?
Volume Encryption: Encrypted volumes allow you to keep many files securely encrypted within one encrypted file volume. Individual files can easily be accessed (assuming the volume is mounted as a drive using the password). Dismount the volume when finished and no one else will be able to access the files in the volume without 'mounting' back to a drive (and to do this the correct Pass Phrase is required)
Physical theft : An adversary gains physical access to a system or device through theft of the item. But even a advisory gains the physical access it will not able to access the files because of volume encryption.
Denial Of Service : Denial of Service (DoS) attacks, in which attackers make it impossible for network users to access information or services by flooding the network with requests that tie up its resources. But that information in case of volume encryption is accessible only if the decryption is possible otherwise it will be not be readable.
Subversion: It refers to a process by which the values and principles of a system in place are contradicted or reversed, in an attempt to transform the established social order and its structures of power, authority, hierarchy. But in case of volume encryption a attacker can't able to change the structure, hierarchy until and unless they know the password.
In masquerade and forgery attacker authenticate themselves as the legitimate user and access the system but even getting the physical access they will not able to access the system information due to volume encryption.
Disclosure as from the name the information accessed by the attacker is disclosed but it's of no use as it is encrypted in volume encryption and hence prevents this attack.
Eavesdropping is one of the attack that might more likely to occur in case of volume encryptions. It arises when we can't always keep our drive physically safe or under appropriate software protection. The volume encryption will not work if the attacker cracks open the computer's case. An attacker can bypass any BIOS or operating system by connecting the hard drive to a different motherboard.