I. J. Computer Network and Information Security, 2013, 8, 19-27 Published Online June 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2013.08.03 Information Leakage Prevention Using Virtual Disk Drive Tarek S. Sobh Information Systems Department, Egyptian Armed Forces, Cairo, Egypt
[email protected] Abstract — The worst news for information technology Table 1: Types of Disk Encryption [17] people are computer has been stolen or lost. The actual Full Disk encryption File, Volume folder problem is the loss of the data stored on the hard drive encryption that can fall into the wrong hands. However, users of Sector by sector without Requires manual intervention information system and laptops computers are facing real creating temporary or backup to decrypt every time you problems with due to intruders using attack techniques files want to use it when they are connected to the network and lost or stolen Large files will decrypt Habit of creating temporary computers. In order to protect your organization against without reduced performance files information leakage you should encrypt this data by only File encryption is normally a Files are not safely deleted much slower process when the program exits allowing the user with access to the encryption key to Full disk encryption also Data can easily be accessed view the data, authorized application usage, and control avoids time consuming tasks who gets access to specific types of data. Safe decommissioning of PCs This work focuses on confidentiality of secure information storage. In addition, it presents the model to This work introduces a security tool called ―SecDisk‖ create of a Virtual Disk Drive (VDD) on MS Windows, to find an integrated secure way to generate and hide disk that appear to the user (after the mounting process) as portion.