Top Banner
32

Attacking and Defending Full Disk Encryption

Dec 18, 2014

Download

Technology

Hurricane Labs

One of your company's laptops was just stolen.  You know that there was sensitive information on the machine.  You also know that full disk encryption was deployed.  Is your data safe?  Can you prove it?

Many organizations are flocking to full disk encryption as a solution to their data security requirements.  Unfortunately, many of these installations view the deployment of full disk encryption as a panacea for any and all security concerns for their laptop fleets.  All too often, these systems are neither properly configured nor adequately tested.

In this talk, Tom will analyze the challenges associated with both attacking and defending systems protected with full disk encryption.  Many of the examples provided will draw from Tom's personal experience, including a case where a fully encrypted and powered down system was able to be fully compromised as part of a penetration test.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Attacking and Defending Full Disk Encryption
Page 2: Attacking and Defending Full Disk Encryption
Page 3: Attacking and Defending Full Disk Encryption
Page 4: Attacking and Defending Full Disk Encryption
Page 5: Attacking and Defending Full Disk Encryption
Page 6: Attacking and Defending Full Disk Encryption
Page 7: Attacking and Defending Full Disk Encryption
Page 8: Attacking and Defending Full Disk Encryption
Page 9: Attacking and Defending Full Disk Encryption
Page 10: Attacking and Defending Full Disk Encryption
Page 11: Attacking and Defending Full Disk Encryption
Page 12: Attacking and Defending Full Disk Encryption
Page 13: Attacking and Defending Full Disk Encryption
Page 14: Attacking and Defending Full Disk Encryption
Page 15: Attacking and Defending Full Disk Encryption
Page 16: Attacking and Defending Full Disk Encryption
Page 17: Attacking and Defending Full Disk Encryption
Page 18: Attacking and Defending Full Disk Encryption
Page 19: Attacking and Defending Full Disk Encryption
Page 20: Attacking and Defending Full Disk Encryption
Page 21: Attacking and Defending Full Disk Encryption
Page 22: Attacking and Defending Full Disk Encryption
Page 23: Attacking and Defending Full Disk Encryption
Page 24: Attacking and Defending Full Disk Encryption
Page 25: Attacking and Defending Full Disk Encryption
Page 26: Attacking and Defending Full Disk Encryption
Page 27: Attacking and Defending Full Disk Encryption
Page 28: Attacking and Defending Full Disk Encryption
Page 29: Attacking and Defending Full Disk Encryption
Page 30: Attacking and Defending Full Disk Encryption
Page 31: Attacking and Defending Full Disk Encryption
Page 32: Attacking and Defending Full Disk Encryption