A user comes to you and explains that she needs some form

Assignment Help Computer Engineering
Reference no: EM13380311

A user comes to you and explains that she needs some form of encrypted file system to store sensitive information on a Flash drive.

The Flash drive will be used to transport the sensitive data between work and home and she is worried about loosing the drive and having the data stolen. Both machines, the one at home and the one at work, use the same Linux OS.

She has the following requirements:

She does not want to encrypt individual files as she has to deal with a large number of files.

She wants it to be as transparent as possible.

She thinks she will only need about 64MB at most.

She wants to also use the ash disk for transporting unencrypted les. Files that can be read on machines apart from her work and home machines.

A 64MB file that contains an encrypted file system, stored on the Flash drive would appear to be ideal|

a. Create a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

Document and explain in your own words every command you use (plus any command line options) and any con guration files you modify or create. Your descriptions of each operation need to show you understand the purpose of the operation.

Note: If you are uncertain why a particular command or command line option is required|ask! There is at least one step and command line option that you cannot understand from the information in the man page alone! It will require some research!

b. Things you must also address and explain:

how to ensure that the Flash drive has exactly the same mount point each time it is used on di erent machines. If it does not have the same mount point then how do you con gure cryptmount paths?

how to manage the file-system encryption keys.

c. Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the file on the ash drive containing the encrypted file system. Also explain how she would use the filesystem in her day-to-day work.

You may assume that she has root access to be able to confi gure her home machine to mount an encrypted file-system

Reference no: EM13380311

Questions Cloud

Since you have created the data objects for harbor view : since you have created the data objects for harbor view mooring you now need to create processes associated with each
Worldwide advertising inc referred to as wai has hired you : worldwide advertising inc. referred to as wai has hired you as an it consultant for implementing their windows network
1nbspunder the von neumann architecture a program and its : 1.nbspunder the von neumann architecture a program and its data are both stored in memory. it is therefore possible for
Question you have been asked to install an svn repository : question you have been asked to install an svn repository on a server. the svn will be remotely accessed using the
A user comes to you and explains that she needs some form : a user comes to you and explains that she needs some form of encrypted file system to store sensitive information on a
Questionon modern networked computers maintaining the : questionon modern networked computers maintaining the correct time on each machine is important. computers on a lan or
Exercise 1the following is a fragment of an xml document : exercise 1the following is a fragment of an xml document instance. identify all the places where it fails to match the
Question 1 write a program that can be used as a math tutor : question 1 write a program that can be used as a math tutor. the program should display two random numbers between land
Create a text file that contains account number 9-digit : create a text file that contains account number 9-digit number type one of the two types current denoted by cu or

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd