Create a 64mb encrypted file system

Assignment Help Basic Computer Science
Reference no: EM13191995

A user comes to you and explains that she needs some form of encrypted file system to store sensitive information on a Flash drive.

The Flash drive will be used to transport the sensitive data between work and home and she is worried about loosing the drive and having the data stolen. Both machines, the one at home and the one at work, use the same Linux OS.

She has the following requirements:

She does not want to encrypt individual files as she has to deal with a large number of files.

She wants it to be as transparent as possible.

She thinks she will only need about 64MB at most.

She wants to also use the ash disk for transporting unencrypted les. Files that can be read on machines apart from her work and home machines.

A 64MB file that contains an encrypted file system, stored on the Flash drive would appear to be ideal|

a. Create a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

Document and explain in your own words every command you use (plus any command line options) and any con guration files you modify or create. Your descriptions of each operation need to show you understand the purpose of the operation.

Note: If you are uncertain why a particular command or command line option is required|ask! There is at least one step and command line option that you cannot understand from the information in the man page alone! It will require some research!

b. Things you must also address and explain:

how to ensure that the Flash drive has exactly the same mount point each time it is used on di erent machines. If it does not have the same mount point then how do you con gure cryptmount paths?

how to manage the file-system encryption keys.

c. Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the file on the ash drive containing the encrypted file system. Also explain how she would use the filesystem in her day-to-day work.

You may assume that she has root access to be able to confi gure her home machine to mount an encrypted file-system

Reference no: EM13191995

Questions Cloud

State the compound known as butylated hydroxytoluene : The compound known as butylated hydroxytoluene, abbreviated as BHT, contains carbon, hyrdrogen, and oxygen. A 2.626 g sample of BHT was combusted in an oxygen rich environment to produce 7.867g of
Define the balanced neutralization reaction : Write the balanced neutralization reaction between H2SO4 and KOH in aqueous solution. Phases are optional.
Explain your overall ethics program plan for organization : You presentation should conatain the following elements: Explain your overall ethics program plan for the organization. Describe, in general, the ethics training program you envision for the company. Suggest ways in which ethics will be monitored wit..
Do you support the proposed tax hike : How does this proposed tax hike affect the social cost of gasoline consumption in the short-run In the long-run d. Do you support this proposed tax hike If yes defend your position If not provide an alternative policy (Answer as an economists, n..
Create a 64mb encrypted file system : Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the le on the ash drive containing the encrypted le system.
Define the balanced equation for the reaction of aqueous : What mass of precipitate will form if 1.50 L of concentrated Pb(ClO3)2 is mixed with 0.850 L of 0.190 M NaI? Assume the reaction goes to completion.
Water self-dissociation to find the hydronium concentration : What is the pH of 1.0 x 10^-4 M phenol where ka = 1.3 x 10^-10? This is a weak acid under dilute conditions. You need to take into account water self-dissociation to find the hydronium concentration.
Thomas paine''s pamphlet : Thomas Paine's pamphlet which gave great momentum to the movement for independence from Britain was titled
Calculate the value of the government budget surplus : Compare the equilibrium levels of consumption C, government spending G, and planned investment I in Parts g and h. Based on this comparison, why might some economists prefer expansionary fiscal policy while others prefer expansionary monetary poli..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find a number alpha mod 8745437489 is not a primitive root

using a computer, show that 7 is a primitive root mod 8745437489. Find a number alpha mod 8745437489 that is not a primitive root

  Determining line cost for three points

Points T1, T2 ,and T3 are 25 miles apart, and points C1 , C2, and C3 also are 25 miles apart. If telephone lines cost $1 per mile, determine the line cost for three?

  The techniques in discovering the requirements

What are some of the techniques in discovering the requirements (fact finding) for a system?

  Early proof of concept

Currently our organisation has a sample running application to sell books which has been designed as an early proof of concept. The application can be found in your installation at C:glassfish3glassfishdocsjavaee-tutorialexamplescase-studiesdukes-boo..

  Create flowchart and psuedo code for math program

Create flowchart and psuedo code for math program which permits the user to enter two separate numbers and choose one of four mathematical operations (add, subtract, mutiply, divide).

  Explain customer relationship management system

Describe what do you mean by a "customer relationship management system". Write and explain several categories of CRM systems.

  Write down sructured english for clyde-s narrative

On a trip lasting more than one day, we permit hotel, taxi, and airfare also meal allowances. Same times apply for meal expenses. Write down sructured English for Clyde's narrative of the reimbursement policies.

  Difference between a permanent address and a care-of address

How big is the MAC address space? The IPv4 address space and what is the difference between a permanent address and a care-of address? Who assigns a care-of address?

  Probability of exactly k collisions and then success

Large population of ALOHA users manage to create 50 requests/sec., including both originals and retransmissions. Time is slotted in units of 40 msec. Compute the probability of exactly K collisions and then a success?

  An msp430-based system interfaces 4 external devices

An MSP430-based system interfaces 4 external devices (ED0, ED1, ED2, ED3), each capable of generating an interrupt request.

  Logic questions

We must allow the traditions of men of old time who affirm themselves to be the offspring of gods that is what they say and they must surely have known their own ancestors.

  Marie program that will input a variable

To develop a MARIE program that will input a variable number of user entered Decimal whole number grades, validating each one (0-100) in a subroutine

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd