Question

In: Computer Science

Physical theft, Denial of Service, Subversion, Masquerade, Disclosure, and Forgery. For each of these general types...

Physical theft, Denial of Service, Subversion, Masquerade, Disclosure, and Forgery.

For each of these general types of attacks, describe how volume encryption helps resist that attack. Is there any attack that volume encryption might make more likely to occur?  

Solutions

Expert Solution

Volume Encryption: Encrypted volumes allow you to keep many files securely encrypted within one encrypted file volume. Individual files can easily be accessed (assuming the volume is mounted as a drive using the password). Dismount the volume when finished and no one else will be able to access the files in the volume without 'mounting' back to a drive (and to do this the correct Pass Phrase is required)

Physical theft : An adversary gains physical access to a system or device through theft of the item. But even a advisory gains the physical access it will not able to access the files because of volume encryption.

Denial Of Service : Denial of Service (DoS) attacks, in which attackers make it impossible for network users to access information or services by flooding the network with requests that tie up its resources. But that information in case of volume encryption is accessible only if the decryption is possible otherwise it will be not be readable.

Subversion: It refers to a process by which the values and principles of a system in place are contradicted or reversed, in an attempt to transform the established social order and its structures of power, authority, hierarchy. But in case of volume encryption a attacker can't able to change the structure, hierarchy until and unless they know the password.

In masquerade and forgery attacker authenticate themselves as the legitimate user and access the system but even getting the physical access they will not able to access the system information due to volume encryption.

Disclosure as from the name the information accessed by the attacker is disclosed but it's of no use as it is encrypted in volume encryption and hence prevents this attack.

Eavesdropping is one of the attack that might more likely to occur in case of volume encryptions. It arises when we can't always keep our drive physically safe or under appropriate software protection. The volume encryption will not work if the attacker cracks open the computer's case. An attacker can bypass any BIOS or operating system by connecting the hard drive to a different motherboard.


Related Solutions

What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on...
What is a Denial of Service attack? Describe two common Denial of Service (DoS) attacks on servers?
(TCOs E and F) A Remington School District employee has been charged with theft and forgery...
(TCOs E and F) A Remington School District employee has been charged with theft and forgery for allegedly stealing approximately $72,000 in district funds. Mary Blaner, 51, was charged in District Court with one count of second-degree felony theft and five counts of third-degree felony forgery. She is the second school district employee to be formally charged with stealing from the district. Both individuals were charged in separate and apparently unrelated cases. Blaner, who was the district's payroll clerk, allegedly...
Which of the following is a denial of service attack? Group of answer choices When a...
Which of the following is a denial of service attack? Group of answer choices When a cracker enters a system through an idle modem, captures the PC attached to the modem, and then gains access to the network to which it is connected. Both a perpetrator who sends hundreds of messages from randomly generated false addresses, overloading an Internet service provider's e-mail server AND a perpetrator who e-mails the same message to everyone on one or more LISTSERV lists are...
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted...
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices. From a high level, a DDoS attack is like a traffic jam clogging up with highway, preventing regular...
Retailing considering the Food and General Merchandise types of retailers (not Service): What type of retailer...
Retailing considering the Food and General Merchandise types of retailers (not Service): What type of retailer do you think is experiencing the biggest growth? Why? What type of retailer do you think is decreasing in popularity? Why? Now thinking of Service Retailers: Why are these types of retailers growing significantly? What specific service retailer do you think does a really good job, meaning it runs very efficiently and takes good care of its customers?
considering the Food and General Merchandise types of retailers (not Service): What type of retailer do...
considering the Food and General Merchandise types of retailers (not Service): What type of retailer do you think is experiencing the biggest growth? Why? What type of retailer do you think is decreasing in popularity? Why? Now thinking of Service Retailers: Why are these types of retailers growing significantly? What specific service retailer do you think does a really good job, meaning it runs very efficiently and takes good care of its customers?
Using about 1000 words or more explain in depth the difference between a denial-of-service attack and...
Using about 1000 words or more explain in depth the difference between a denial-of-service attack and a distributed denial-of-service attack. Research real life stories of the two attacks that happened to a company (or companies) or individuals etc.
6. Information warfare, denial of service, and system tampering are classified under ____________ threat category. 7....
6. Information warfare, denial of service, and system tampering are classified under ____________ threat category. 7. Computer abuse, fraud and theft, falsification, planting of malicious code, and sale of personal information are classified under _______________ threat category. 8. Economic exploitation, information theft, and intrusion of personal privacy are classified under ______________ threat category. 9. Accurate _________________ is the first step towards accomplishing proper planning and accurate budgeting for software development projects. 10. There are ________ major types of cost estimation...
Depression, denial is an kubler-ross stages of death and dying. Explain each
Depression, denial is an kubler-ross stages of death and dying. Explain each
In general, how many types of financial markets exist? Explain each
In general, how many types of financial markets exist? Explain each
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT