Message from the CEO PLF Chief Executive Officer Position

Total Page:16

File Type:pdf, Size:1020Kb

Message from the CEO PLF Chief Executive Officer Position ISSUE 138 | SEPTEMBER 2019 Malpractice Prevention Education for Oregon Lawyers PLF UPDATES Message from the CEO By Carol J. Bernick, PLF Chief Executive Officer After five of the most professionally satisfying years of my career, I am leaving the PLF in the next few months. I am re-joining my former colleagues at Davis Wright Tremaine. I will serve as a strategic partner in a variety of ways, with a focus on mentoring, training, and career development of associates, especially women and lawyers of color. Closing the gender and race gap present in the partnership track of large law firms has been a passion of mine my entire professional life. The opportunity to have a real impact is too important for me to pass up. Yet the decision to leave the PLF was not easy: the quality of work performed by the entire staff is its hallmark. It has been my privilege to work with the PLF’s talented and dedicated staff and defense panel and to witness the impact the PLF has on Oregon lawyers. I thank the PLF Board and everyone at the PLF for giving me this opportunity. Because of your dedication, I am confident that the PLF will continue to serve Oregon lawyers well for years to come. PLF Chief Executive Officer Position The Professional Liability Fund is seeking a new CEO with a desired start date of December 1, 2019. As an independently managed subdivision of the Oregon State Bar, the PLF has a staff of 50 and annual budget of $28 million. Reporting to the PLF’s board, the CEO provides strategic leadership and management for the PLF. Primary responsibilities include policy development, personnel management, claims management, overseeing the budget and investments, and cultivating relationships with the PLF’s stakeholders. Preference will be given to Oregon lawyers with management and litigation experience. The successful candidate must possess excellent communication skills and be able to lead the organization in a collaborative but decisive way, instilling confidence in all stakeholders. In addition to the uniquely rewarding nature of the job, we offer a competitive salary and excellent benefits, including participation in Oregon PERS. The deadline to apply is October 16. For a complete position profile and instructions on applying, visit the PLF website at www.osbplf.org, and click on Job Opportunities under About PLF. EQUAL OPPORTUNITY EMPLOYER TABLE of inBRIEF IS PUBLISHED BY The Professional Liability Fund CONTENTS Carol J. Bernick Chief Executive Officer LAW UPDATES EDITORS Business Breakups: Terminating Ownership Interests .................6 Tanya Hanson, Loss Prevention Attorney in Closely Held Businesses [email protected] Settlement Conferences and “Settler’s Remorse” ...........................9 and Barbara S. Fishleder, Service on Attorney General Is a Necessary Step in .....................11 Director of Personal and Practice Management Assistance Filing Claims for Abuse of Vulnerable Person phone: 503.639.6911 toll-free: 1.800.452.1639 www.osbplf.org PLF UPDATES PROFESSIONAL LIABILITY FUND Message from the CEO....................................................................... 1 BOARD OF DIRECTORS AND OFFICERS Saville W. Easley PLF Chief Executive Officer Position ............................................... 1 Portland Chair ABA TECHSHOW ...............................................................................3 Molly Jo Mullen Portland Vice Chair Tom Newhouse LAW PRACTICE Portland Secretary-Treasurer, Public Member Protect Your Data by Using Encryption ...........................................3 Robert S. Raschio Canyon City Tips, Traps, and Resources ............................................................. 12 Holly N. Mitchell Portland Megan I. Livermore Eugene Susan Marmaduke Portland Gina Anne Johnnie Salem Patrick Hocking Medford Public Member DISCLAIMER This material is provided for informational purposes only and does not establish, report, or create the standard of care for attorneys in Oregon, nor does it represent a complete analysis of the topics presented. Readers should conduct their own appropriate legal research. The information presented does not represent legal advice. This information may not be republished, sold, or used in any other form without the written consent of the Oregon State Bar Professional Liability Fund except that permission is granted for Oregon lawyers to use and modify these materials in their own practices. © 2019 OSB Professional Liability Fund. 2 inBRIEF | Malpractice Prevention Education for Oregon Lawyers | www.osbplf.org PLF UPDATES ABA TECHSHOW February 26 - 29, 2020 Register with PLF Discount Code The ABA TECHSHOW Conference and EXPO is the Hyatt Regency Chicago for ABA TECHSHOW, the where lawyers, legal professionals, and technology all best conference for bringing lawyers and technology come together. For three days, attendees learn about together. the most useful and practical technologies available. The variety of CLE programming offers a great deal of SAVE ON REGISTRATION FEES education in just a short amount of time. Use the Professional Liability Fund Program But there’s more to ABA TECHSHOW than the Promoter Code EP2008 to receive an exclusive educational programs; attendees also get access to the discount on the standard registration rate. EXPO Hall, where legal technology vendors are eager Visit www.techshow.com for details. to demonstrate their helpful products and services. Large group discounts are available. Contact Lyndsey Touch, Talk, and Test your way through more than at [email protected]. 100 technology products. For more information, visit: www.techshow.com. Mark your calendars for February 26-29, 2020, at LAW PRACTICE Protect Your Data by Using Encryption By Hong Dao You may need technical assistance with implementing both types of usage. This article is a continuance of our cybersecurity series. It focuses on encryption as a way to protect Encryption protects two types of data: in transit and your data from physical loss or cyberattacks. at rest. Data in transit refers to data moving between browsers, via emails, and through the cloud. Data at Encryption is a critical step in adopting and rest is data stored on computer hard drives, servers, implementing a security policy in any law office. It databases, and mobile devices. Lawyers deal with both transforms information so it is unintelligible to an types of data. This article will focus on hard drive, file/ unintended recipient. It uses specific algorithms to folder, smart device, cloud, and email encryption. scramble the data into jumbled unreadable codes. The recipient needs to unscramble the data using an FULL DISK ENCRYPTION – ENCRYPTING encryption key in order to decrypt the information. COMPUTER HARD DRIVE You do not need to know how encryption technically Your computer contains client information as well as works to use it. Your “usage” of encryption typically your personal information that you want to protect involves turning on the native encryption program from unauthorized access. If the computer is lost, built into your computing devices. Or it may involve stolen, or hacked, there is a high risk that the data downloading and following instructions to install and will be compromised if it’s not secure. Encrypting set up a third-party encryption software program. the entire hard drive on your computer (called full ISSUE 138 | SEPTEMBER 2019 3 disk encryption) ensures that no one can access computer. Limited encryption provides another anything on it. The encryption makes all data on your layer of security on your encrypted hard drive. It computer unreadable unless it is decrypted with a key addresses a concern with the full disk encryption: (password) that only you have. the hard drive is not always encrypted. When a user turns on the computer and enters the decryption key Computers running on Microsoft Windows have (password), the entire drive is decrypted. It remains a free built-in full disk encryption program called decrypted until it is turned off or logged off again. BitLocker Drive Encryption. They also have Bitlocker During the time the computer is turned on and in to Go that can be used to encrypt external drives its decrypted state, your data is vulnerable if left like USB flash drives and other portable hard unattended. Limited encryption helps make those drives. However, both Bitlocker programs are only files inaccessible during that period. available in the Professional or Enterprise editions of Windows 8 or 10, or the Ultimate version of Windows For those looking for extra security by encrypting 7. (Beginning January 14, 2020, Microsoft will no selected files and folders, you have a few options. longer support Windows 7. Computers running on • Windows Users unsupported operating systems are more vulnerable to malware and other types of attacks.) Windows has an encryption method called “encrypting file system” (EFS) that allows Instructions to turn on BitLocker are available on the users to encrypt files or folders. EFS is only Microsoft website here: https://support.microsoft. available on Professional and Enterprise com/en-us/help/4028713/windows-10-turn-on-device- editions of Windows. More information on how encryption. Once BitLocker is enabled with a strong to use this feature is available here: https:// password or passphrase, the contents of the hard drive www.thewindowsclub.com/encrypt-files-efs- are automatically encrypted when the authorized user encryption-windows-10. logs off and are decrypted when the user logs on. • Mac Users Most of us buy
Recommended publications
  • Operating System Boot from Fully Encrypted Device
    Masaryk University Faculty of Informatics Operating system boot from fully encrypted device Bachelor’s Thesis Daniel Chromik Brno, Fall 2016 Replace this page with a copy of the official signed thesis assignment and the copy of the Statement of an Author. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Daniel Chromik Advisor: ing. Milan Brož i Acknowledgement I would like to thank my advisor, Ing. Milan Brož, for his guidance and his patience of a saint. Another round of thanks I would like to send towards my family and friends for their support. ii Abstract The goal of this work is description of existing solutions for boot- ing Linux and Windows from fully encrypted devices with Secure Boot. Before that, though, early boot process and bootloaders are de- scribed. A simple Linux distribution is then set up to boot from a fully encrypted device. And lastly, existing Windows encryption solutions are described. iii Keywords boot process, Linux, Windows, disk encryption, GRUB 2, LUKS iv Contents 1 Introduction ............................1 1.1 Thesis goals ..........................1 1.2 Thesis structure ........................2 2 Boot Process Description ....................3 2.1 Early Boot Process ......................3 2.2 Firmware interfaces ......................4 2.2.1 BIOS – Basic Input/Output System . .4 2.2.2 UEFI – Unified Extended Firmware Interface .5 2.3 Partitioning tables ......................5 2.3.1 MBR – Master Boot Record .
    [Show full text]
  • Effective Crypto Ransomawre Detection Using Hardware
    Effective Crypto Ransomawre Detection Using Hardware Performance Counters John Podolanko Department of Computer Science & Engineering The University of Texas at Arlington Supervisor Jiang Ming, PhD In partial fulfillment of the requirements for the degree of Master of Science in Computer Science May 2019 Abstract Systems affected by malware in the past 10 years has risen from 29 million to 780 million, which tells us it is a rapidly growing threat. Viruses, ransomware, worms, backdoors, botnets, etc. all come un- der malware. Ransomware alone is predicted to cost $11.5 billion in 2019. As the downtime, data loss, and financial damages are ris- ing, researchers continue to look for new ways to mitigate this threat. However, the common approaches have shown to yield high false posi- tive rates or delayed detection rates resulting in data loss. My research explores a dynamic approach for early-stage ransomware detection by modeling its behavior using hardware performance counters with low overhead. The analysis begins on a bare-metal machine running ran- somware which is profiled for hardware calls using Intel R VTuneTM Amplifier before it compromises the system. By using this approach, I am able to generate models using hardware performance counters extracted by VTuneTM on known ransomware samples collected from VirusTotal and Hybrid Analysis, and I use that data to train the de- tection system using machine learning techniques. I have shown that hardware performance counters can provide effective metrics for use in detecting and mitigating the ever-growing ransomware threat faced by the world while ensuring no data is lost. ii Acknowledgements The author thanks the supervisory committee for all their guidance, support, and patience.
    [Show full text]
  • Taxonomy for Anti-Forensics Techniques & Countermeasures
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by St. Cloud State University St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 4-2020 Taxonomy for Anti-Forensics Techniques & Countermeasures Ziada Katamara [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Katamara, Ziada, "Taxonomy for Anti-Forensics Techniques & Countermeasures" (2020). Culminating Projects in Information Assurance. 109. https://repository.stcloudstate.edu/msia_etds/109 This Starred Paper is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. Taxonomy for Anti-Forensics Techniques and Countermeasures by Ziada Katamara A Starred Paper Submitted to the Graduate Faculty of St Cloud State University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Assurance June, 2020 Starred Paper Committee: Abdullah Abu Hussein, Chairperson Lynn A Collen Balasubramanian Kasi 2 Abstract Computer Forensic Tools are used by forensics investigators to analyze evidence from the seized devices collected at a crime scene or from a person, in such ways that the results or findings can be used in a court of law. These computer forensic tools are very important and useful as they help the law enforcement personnel to solve crimes. Computer criminals are now aware of the forensics tools used; therefore, they use countermeasure techniques to efficiently obstruct the investigation processes.
    [Show full text]
  • Data Protection and Collaboration in Cloud Storage
    Technical Report 1210 Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage G. Itkis B.H. Kaiser J.E. Coll W.W. Smith R.K. Cunningham 7 July 2016 Lincoln Laboratory MASSACHUSETTS INSTITUTE OF TECHNOLOGY LEXINGTON, MASSACHUSETTS This material is based on work supported by the Department of Homeland Security under Air Force Contract No. FA8721-05-C-0002 and/or FA8702-15-D-0001. Approved for public release: distribution unlimited. This report is the result of studies performed at Lincoln Laboratory, a federally funded research and development center operated by Massachusetts Institute of Technology. This material is based on work supported by the Department of Homeland Security under Air Force Contract No. FA8721-05- C-0002 and/or FA8702-15-D-0001. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of Department of Homeland Security. © 2016 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work. Massachusetts Institute of Technology Lincoln Laboratory Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage G. Itkis B. Kaiser J. Coll W. Smith R.
    [Show full text]
  • WO 2015/089171 Al 18 June 2015 (18.06.2015) W P O P C T
    (12) INTERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT) (19) World Intellectual Property Organization International Bureau (10) International Publication Number (43) International Publication Date WO 2015/089171 Al 18 June 2015 (18.06.2015) W P O P C T (51) International Patent Classification: ACHARYA, Visal Chandrakant; 39 Parlin Street #407, G06F 21/10 (2013.01) G06F 15/16 (2006.01) Everett, Massachusetts 02149 (US). DSILVA, Benedict Robert; 155 5th Street, Apt. 1, Cambridge, Massachusetts (21) International Application Number: 02141 (US). TEARNEN, Paul; 3221 Point Place SW, PCT/US20 14/0695 19 Seattle, Washington 981 16 (US). WENZEL, Peter; 2245 (22) International Filing Date: E. Colorado Blvd. #104-168, Pasadena, California 9 1107 10 December 2014 (10. 12.2014) (US). HELD, John; 2713 McDuffee Circle, North Aurora, Illinois 60542 (US). WEIBLEN, Charlie; 169 Franklin (25) Filing Language: English Street, Wrentham, Massachusetts 02093 (US). KANNAN, (26) Publication Language: English Ganesh; 2 Bent Avenue, Wayland, Massachusetts 01778 (US). PARIMI, Madhavi; 74 Presidential Drive, Apt 5, (30) Priority Data: Quincy, Massachusetts 02169 (US). AZUMA, Selom 61/914,682 11 December 201 3 ( 11. 12.2013) US Harry; 25 Church Street, Suite 1, Boston, Massachusetts 61/944,756 26 February 2014 (26.02.2014) US 021 16 (US). MAHAJAN, Himali; 30 Revere Beach Pkwy, (71) Applicant: INTRALINKS, INC. [US/US]; 150 East 42nd Apt# 312, Medford, Massachusetts 02155 (US). LIRIO, Street, New York, New York 10017 (US). Dario R.; 11 Goddard Street, Newton, Massachusetts 02461 (US). WALUK, Michael Joseph; 18 Mariah's Path, (72) Inventors: MCCARTHY, Kevin L.; 251 Gray Street, Ar Pembroke, Massachusetts 02359 (US).
    [Show full text]
  • Winter 2016 E-Newsletter
    WINTER 2016 E-NEWSLETTER At Digital Mountain we assist our clients with their e-discovery, computer forensics and cybersecurity needs. With increasing encryption usage and the recent news of the government requesting Apple to provide "backdoor" access to iPhones, we chose to theme this E-Newsletter on the impact data encryption has on attorneys, litigation support professionals and investigators. THE SHIFTING LANDSCAPE OF DATA ENCRYPTION TrueCrypt, a free on-the-fly full disk encryption product, was the primary cross-platform solution for practitioners in the electronic discovery and computer forensics sector. Trusted and widely adopted, TrueCrypt’s flexibility to perform either full disk encryption or encrypt a volume on a hard drive was an attractive feature. When TrueCrypt encrypted a volume, a container was created to add files for encryption. As soon as the drive was unmounted, the data was protected. The ability to add a volume to the original container, where any files or the folder structure could be hidden within an encrypted volume, provided an additional benefit to TrueCrypt users. However, that all changed in May 2014 when the anonymous team that developed TrueCrypt decided to retire support for TrueCrypt. The timing of TrueCrypt’s retirement is most often credited to Microsoft’s ending support of Windows XP. The TrueCrypt team warned users that without support for Windows XP, TrueCrypt was vulnerable. Once support for TrueCrypt stopped, trust continued to erode as independent security audits uncovered specific security flaws. In the wake of TrueCrypt’s demise, people were forced to look for other encryption solutions. TrueCrypt’s website offered instructions for users to migrate to BitLocker, a full disk encryption program available in certain editions of Microsoft operating systems beginning with Windows Vista.
    [Show full text]
  • Full-Disk-Encryption Crash-Course
    25C3: Full-Disk-Encryption Crash-Course Everything to hide Jürgen Pabel, CISSP Akkaya Consulting GmbH #0 Abstract Crash course for software based Full-Disk-Encryption. The technical architectures of full-disk-encryption solutions for Microsoft Windows and Linux are described. Technological differences between the two open-source projects TrueCrypt and DiskCryptor are explained. A wish-list with new features for these open-source Full-Disk-Encryption offerings wraps things up. Readers should be familiar with general operating system concepts and have some software development experience. #1 Introduction Software based Full-Disk-Encryption (¹FDEª) solutions are usually employed to maintain the confidentiality of data stored on mobile computer systems. The established terminology is ¹data-at-rest protectionª; it implies that data is protected against unauthorized access, even if an adversary possesses the storage media. Therefore, some of the most common risks to data confidentiality are addressed: loss and theft of mobile computer systems. The encryption and decryption of data is completely transparent to computer users, which makes Full-Disk- Encryption solutions trivial to use. The only user interaction occurs in the Pre-Boot-Authentication (¹PBAª) environment, in which the computer user provides the cryptographic key in order to allow for the operating system to be started and data to be accessed. #2 Architecture I: Pre-Boot-Authentication The Pre-Boot-Authentication environment is loaded before the operating system when the computer is powered-on. The primary purpose of the Pre-Boot-Authentication is to load the encryption key into memory and to initiate the boot process of the installed operating system.
    [Show full text]
  • Advanced Notification of Cyber Threats Against Mamba Ransomware
    Advanced Notification of Cyber Threats against Mamba Ransomware Security Advisory AE-Advisory 17-42 Criticality Critical Advisory Released On 13 August 2017 Impact Mamba ransomware fully encrypts the hard drive of an infected machine. Solution Adhere the advices written under the solution section. Affected Platforms Windows Operating System (OS) Summary As the leading trusted secure cyber coordination center in the region, aeCERT has researched and found about a ransomware that is new to the region currently named as “Mamba Ransomware”. Mamba ransomware uses DiskCryptor to encrypt the disks by using a very strong full disk encryption method. The hacker uses psexec utility to gain access to the network and infect the machine with the malware. The malware goes deep into the system to gain access to all services, forces the machine to restart, then starts to encrypt the disk. Advisory Details Mamba ransomware’s initial distribution is similar to other ransomware-type viruses, such as WannaCrypt and Petya. Furthermore, Mamba is used against corporations and organizations. The attacker uses Mamba ransomware to encrypt the hard drive of the victim’s machine. This ransomware uses a legitimate utility called DiskCryptor to achieve full disk encryption of the infected machine on the Master Boot Record level. In order to decrypt the machine, the victim is asked to contact the attacker for the decryption of the hard drive. This group of attackers need to gain access to the network of the company by using psexec utility to run the ransomware on the victim’s machine. The exploit generates a password for DiskCryptor utility.
    [Show full text]
  • Comparison of Disk Encryption Software 1 Comparison of Disk Encryption Software
    Comparison of disk encryption software 1 Comparison of disk encryption software This is a technical feature comparison of different disk encryption software. Background information Name Developer First released Licensing Maintained? ArchiCrypt Live Softwaredevelopment Remus ArchiCrypt 1998 Proprietary Yes [1] BestCrypt Jetico 1993 Proprietary Yes BitArmor DataControl BitArmor Systems Inc. 2008-05 Proprietary Yes BitLocker Drive Encryption Microsoft 2006 Proprietary Yes Bloombase Keyparc Bloombase 2007 Proprietary Yes [2] CGD Roland C. Dowdeswell 2002-10-04 BSD Yes CenterTools DriveLock CenterTools 2008 Proprietary Yes [3][4][5] Check Point Full Disk Encryption Check Point Software Technologies Ltd 1999 Proprietary Yes [6] CrossCrypt Steven Scherrer 2004-02-10 GPL No Cryptainer Cypherix (Secure-Soft India) ? Proprietary Yes CryptArchiver WinEncrypt ? Proprietary Yes [7] cryptoloop ? 2003-07-02 GPL No cryptoMill SEAhawk Proprietary Yes Discryptor Cosect Ltd. 2008 Proprietary Yes DiskCryptor ntldr 2007 GPL Yes DISK Protect Becrypt Ltd 2001 Proprietary Yes [8] cryptsetup/dmsetup Christophe Saout 2004-03-11 GPL Yes [9] dm-crypt/LUKS Clemens Fruhwirth (LUKS) 2005-02-05 GPL Yes DriveCrypt SecurStar GmbH 2001 Proprietary Yes DriveSentry GoAnywhere 2 DriveSentry 2008 Proprietary Yes [10] E4M Paul Le Roux 1998-12-18 Open source No e-Capsule Private Safe EISST Ltd. 2005 Proprietary Yes Dustin Kirkland, Tyler Hicks, (formerly [11] eCryptfs 2005 GPL Yes Mike Halcrow) FileVault Apple Inc. 2003-10-24 Proprietary Yes FileVault 2 Apple Inc. 2011-7-20 Proprietary
    [Show full text]
  • Quick Hardware Tips Ground Running
    Apps & Software for Law Practice Efficiency & Security Presented by Matt Edmonds of Edmonds Legal Solutions on behalf of the Lawyers’ Insurance Association of Nova Scotia 20 May 2015 via webinar and in person at the NSBS & LIANS offices in Halifax, NS Below, I have included links to online resources related to the content of Apps & Software each slide, along with some of my own comments. If you have any questions, for Law Practice Efficiency & Security please don’t hesitate to contact me at [email protected]. Matt Edmonds These materials are available for download at edmondslegal.ca/cpd. Lawyer & Legal IT Consultant For best results, view this document digitally or print in colour. Presented on behalf of: 20 May 2015 [email protected] Edmonds Legal Solutions helps legal professionals discover and implement the right software to make their practices efficient and secure. If you'd like to use any of the tools mentioned in this presentation, and need some help deploying them, I can set things up for everyone at your firm and provide training so you can hit the Quick hardware tips ground running. Email: [email protected] Phone: 902-441-8432 Web: edmondslegal.com Twitter: @MatthewEdmonds LinkedIn: ca.linkedin.com/in/edmondsmatt [email protected] Materials available at edmondslegal.com/cpd 2015-05-20 Apps & Software for Law Practice Efficiency & Security 2 As a lawyer, your computer is probably your most important tool. Inexpensive business desktops may meet the needs of some staff, but The next computer you buy should be lawyers should think about investing in the best a MacBook, MacBook Air, or MacBook Pro machine for their own workflow.
    [Show full text]
  • Disk Encryption
    Centre for Research on Cryptography and Security DiskDisk encencryptryptionion ...... MilanMilan BrožBrož ESETESET [email protected]@fi.muni.cz OctoberOctober 30,30, 20142014 FDE - Full Disk Encryption ● Transparent encryption on disk level (sectors) FDE (Full Disk Encryption) FVE (Full Volume Encryption) ... + offline protection for notebook, external drives + transparent for filesystem + no user decision later what to encrypt + encryption of hibernation and swap file + key removal = easy data disposal - more users, disk accessible to all of them - key disclosure, complete data leak - sometimes performance problems FDE – layer selection ● userspace (In Linux usually FUSE handled) (not directly in OS kernel) SW ● sw driver - low-level storage/SCSI - virtual device dm-crypt, TrueCrypt, DiskCryptor, Bitlocker, ... AES-NI, special chips (mobile), TPM (Trusted Platform Module) ● driver + hw (hw acceleration) ● disk controller Chipset FDE (... external enclosure) HW Many external USB drives with "full hw encryption" HDD FDE Hitachi: BDE (Bulk Data Encryption) ● on-disk special drives Seagate: FDE (Full Disk Encryption) Toshiba: SED (Self-Encrypting Drives) ... Chipset or on-disk FDE ● Encryption algorithm is usually AES-128/256 ... encryption mode is often not specified clearly ● Where is the key stored? ● proprietary formats and protocols ● randomly generated? ● External enclosure ● Encryption often present (even if password is empty) => cannot access data without enclosure HW board ● Recovery: you need the same board / firmware ● Weak hw part: connectors ● Full system configuration ● laptop with FDE support in BIOS / trusted boot ● Vendor lock-in ● FIPS 140-2 (mandatory US standard, not complete evaluation of security!) Chipset FDE examples ● Encryption on external disk controller board + standard SATA drive ● USB3 external disk enclosure ● AES-256 encryption http://imgs.xkcd.com/comics/security.png DiskDisk encencryptryptionion .....
    [Show full text]
  • Pengembangan Private Cloud Storage Sebagai Sentralisasi Data Universitas Nahdlatul Ulama Sidoarjo Berbasis Open Source Owncloud
    Jurnal Ilmu Komputer dan Desain Komunikasi Visual Vol 3, No 1, Juli 2018 ISSN (Cetak) : 2541-4550 ISSN (Online) : 2541-4585 Pengembangan Private Cloud Storage sebagai Sentralisasi Data Universitas Nahdlatul Ulama Sidoarjo Berbasis Open Source Owncloud 1 2 Moch Kholil , Syahri Mu’min 1 Program Studi D2 Penyuntingan Audio dan Video (Multimedia) Akademi Komunitas Negeri Putra Sang Fajar Blitar Jln. Tanjung No.1 Blitar [email protected] 2 Program Studi Sistem Informasi, Fakultas Ilmu Komputer, Universitas Nahdlatul Ulama Sidoarjo Jln. Mongonsidi Kav. DPR Sidoklumpuk Sidoarjo [email protected] Abstrak Cloud Storage memberikan beberapa kemudahan dalam sentralisasi penyimpanan data. Cloud Storage merupakan media penyimpanan yang di dalam pengaksesannya memerlukan jaringan internet. File dan data disimpan di komputer dimana user harus membuat akun Cloud Storage terlebih dahulu. Sebagai langkah kemudahan dalam mengakses data dalam sebuah instansi maka dibutuhkan strategi sentralisasi data yang dapat diakses dan berbagi file atau data bersama dengan biaya lebih murah. Private Cloud Storage bisa dicapai dengan mengimplementasikan Framework ownCloud berbasis Open Source. Penelitian ini bertujuan untuk mengembangkan teknologi penyimpanan data secara terpusat yang memungkinkan user bisa berbagi file atau data bersama. Kata Kunci: Cloud Storage, ownCloud, Private Cloud Storage, Open Source 1. PENDAHULUAN Perkembangan teknologi saat ini mengalami perubahan yang sangat pesat. Hal ini mempengaruhi perkembangan media penyimpanan pada komputer dari masa ke masa. Salah satu jenis berkembangannya adalah media penyimpanan berbasis cloud (awan). Cloud (awan) adalah metafora dari internet, sebagaimana awan yang sering digambarkan di diagram jaringan komputer. Menurut makalah tahun 2008 yang dipublikasikan IEEE Internet Computing, Cloud Computing merupakan suatu paradigma dimana informasi secara permanen tersimpan di server intenet dan tersimpan secara sementara di computer pengguna (client) termasuk di dalamnya desktop, komputer, tablet, notebook dan lain- lain.
    [Show full text]