Explain how you installed the cryptmount package

Assignment Help Computer Networking
Reference no: EM13325734

A user comes to you and explains that she needs some form of encrypted le system to store sensitive information on a Flash drive. The Flash drive will be used to transport the sensitive data between work and home and she is worried about loosing the drive and having the data stolen. Both machines, the one at home and the one at work, use the same Linux OS.

She has the following requirements:

She does not want to encrypt individual les as she has to deal with a large number of les.

She wants it to be as transparent as possible.

She thinks she will only need about 64MB at most.

She wants to also use the ash disk for transporting unencrypted les. Files that can be read on machines apart from her work and home machines.

A 64MB le that contains an encrypted le system, stored on the Flash drive would appear to be ideal|

a. Create a 64MB encrypted le system in a leon a Flash drive so that it can be used with the cryptmount command.

Document and explain in your own words every command you use (plus any command line options) and any con guration les you modify or create. Your descriptions of each operation need to show you understand the purpose of the operation.

Note: If you are uncertain why a particular command or command line option is required|ask! There is at least one step and command line option that you cannot understand from the information in the man page alone! It will require some research!

b. Things you must also address and explain:

how to ensure that the Flash drive has exactly the same mount point each time it is used on di erent machines. If it does not have the same mount point then how do you con gure cryptmount paths? Hint: Experiment with \labelled" le-systems (see the command e2label or dosfslabel) or UUIDs in conjunction with the le /etc/fstab how to manage the le-system encryption keys.

c. Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the le on the ash drive containing the encrypted le system. Also explain how she would use the lesystem in her day-to-day work.

You may assume that she has root access to be able to con gure her home machine to mount an encrypted le-system.

a. Do not use the tool cryptmount-setup or the tool installed by the package cryptsetup.
b. Manually create les and con guration les.
c. Follow the steps outlined in the cryptmount man page| explaining the purpose of every step!
d. List all resources used in answering the question.
e. Do not explain how you installed the cryptmount package|it should already be installed on the Virtual Debian.

Reference no: EM13325734

Questions Cloud

Is employment protection bad for employment : Can you please give me some ideas about the question above. so that I can write an essay out of these ideas?? I need to turn it in tonight it is so urgent.
How to install the subversion package : Implement con guration and runtime options that increase security|explaining why your choices increase security.
What is the effect on total checkable deposits in the econom : Suppose the reserve requirement (R) is 15%. What is the effect on total checkable deposits in the economy if bank reserves increase by $60 billion. Assume E=0
Find the magnitude of the cats centripetal acceleration : A cat rides a merry-go-round while turning with uniform circular motion. At time t1 = 2.00 s, the cat's velocity is v1 = (5.50) i + (4.00 m/s) j, What is the magnitude of the cat's centripetal acceleration
Explain how you installed the cryptmount package : She wants to also use the ash disk for transporting unencrypted les. Files that can be read on machines apart from her work and home machines.
The rise of social media : The rise of social media and its power to instantaneously connect people to others is a testament to just how interconnected the world has become. Social media has become an important way to form and maintain relationships. Many use social media plat..
Evaluate the time it will take to flush 99% of the discharge : Estimate the time it will take to flush 99% of the discharge from the lake. Immediately after the spill, the lake, completely mixed, has a pH of 8 and the total molar concentration of nitrogen species (NH3 and NH4+) is 7.1×10-4 mol/L. what is the ..
What is utc and why is it used : The topics above are linked to each other and the question, they are not independent of each other. They are provided as a minimal guide only. Do not simply write an unconnected paragraph on each without linking the concepts together.
Find the acceleration of the rocket : A 125-kg (including all the contents) rocket has an engine that produces a constant vertical force (the thrust) of 1720 N. Inside this rocket, Find the acceleration of the rocket

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain transit systems for both avl and tsp

Outcome of this process must then be incorporated into ITS regional architecture. Are there plans to give ems vehicles with signal priority/pre-emption?

  Identity intended recipient of data-statistical multiplexor

When data is transmitted using a statistical multiplexor, the individual units of data must have some form of address that tells the receiver the identity of the intended recipient of each piece of data.

  Handling the project

The issues is pharmaceutical(drugs), explain how you would deal with one of the situations listed below which has brought you project to an abrupt stand still, the employer is supposing No responsibility, and wishes you to work it out.

  Purpose of key tag in rrsig resource record

Determine the purpose of the key tag in the RRSIG resource record.

  Explaining system development life cycle

What is the system development life cycle and what are the best ways to bring social networking to life within this cycle?

  Find length of longest consecutive sequence of os in input

Input stream to 4B/5B block encoder is 0100 0000 0000 0000 0000 OOOI. Answer the following questions: Determine length of longest consecutive sequence of Os in input?

  Does node refrain from transmitting its scheduled time

Assume nodes A and B are on same 10 Mbps Ethernet bus, and propagation delay between two nodes is 245 bit times. Does B refrain from transmitting at its scheduled time?

  Find the rfc which defines ftp protocol

Find the RFC that defines the FTP protocol. Take any non text file (e.g. word document, mpg, excel or any application centric file) Segmentation of a file and forming FTP datagrams: Read first 'x' number of bytes and use them as part of payload sect..

  Explain privacy issues related with acxiom-s business

Break into small groups with classmates, and explain privacy issues related with Acxiom's business. Do you believe they are doinganything wrong?

  Reliable deal with supplier and client reluctance

How might reliable deal with supplier and client reluctance to provide detailed information about their internal operation?

  How rtsp vary from http in-band-out-of-band traffic

Describe how does RTSP vary from HTTP (a) in sustaining client state information; (b) in terms of in-band, out-of-band traffic?

  Home networking solutions

Question:  The Thomsons all have their own separate computers at home. The problem is, there is only one printer, and it is attached to Bob's computer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd