Create a 64mb encrypted file system

Assignment Help Basic Computer Science
Reference no: EM13191995

A user comes to you and explains that she needs some form of encrypted file system to store sensitive information on a Flash drive.

The Flash drive will be used to transport the sensitive data between work and home and she is worried about loosing the drive and having the data stolen. Both machines, the one at home and the one at work, use the same Linux OS.

She has the following requirements:

She does not want to encrypt individual files as she has to deal with a large number of files.

She wants it to be as transparent as possible.

She thinks she will only need about 64MB at most.

She wants to also use the ash disk for transporting unencrypted les. Files that can be read on machines apart from her work and home machines.

A 64MB file that contains an encrypted file system, stored on the Flash drive would appear to be ideal|

a. Create a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

Document and explain in your own words every command you use (plus any command line options) and any con guration files you modify or create. Your descriptions of each operation need to show you understand the purpose of the operation.

Note: If you are uncertain why a particular command or command line option is required|ask! There is at least one step and command line option that you cannot understand from the information in the man page alone! It will require some research!

b. Things you must also address and explain:

how to ensure that the Flash drive has exactly the same mount point each time it is used on di erent machines. If it does not have the same mount point then how do you con gure cryptmount paths?

how to manage the file-system encryption keys.

c. Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the file on the ash drive containing the encrypted file system. Also explain how she would use the filesystem in her day-to-day work.

You may assume that she has root access to be able to confi gure her home machine to mount an encrypted file-system

Reference no: EM13191995

How does java distinguish between ipv4 and ipv6 addresses

Assume we design a new client-server application program that requires persistent connection. Can we use UDP as the underlying transport-layer protocol for this new applicat

Discuss the differences and similarities of the two pyramid

The design pyramid for OOD differs somewhat from the pyramid described for conventional software design (Chapter 13). Discuss the differences and similarities of the two pyr

Five pseudo random number generators

Evaluate the five pseudo random number generators (RNGs) supplied with respect to the quality of the generated random sequence. High quality random number generators are fun

Different version of grade calculator program

Create a different version of the Grade Calculator program from the zybook chapter 3 that calculates the overall grade for four equally-weighted programming assignments, whe

Give the number of candidate pairs on the second pass

Give, as a function of s ranging from 0 to 1, the number of frequent items on Pass 1 of the A-Priori Algorithm. Also, give the number of candidate pairs on the second pass.

Maintaining an organization large networks

When you are an IT specialist who is tasked with maintaining an organization's large networks, it is important have an understanding of potential risks. It has been said mos

Diagram a process for planning and cooking a family dinner

Does your process resemble the generic product development process? Is cooking dinner analogous to a market-pull, technology-push, platform, process-intensive, customization

Collaboration and social media

While planning for a new project, a young developer mentions that she used Facebook as a collaborative group space for developing her senior project. She tells you that it w

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd