A user comes to you and explains that she needs some form

Assignment Help Computer Engineering
Reference no: EM13380311

A user comes to you and explains that she needs some form of encrypted file system to store sensitive information on a Flash drive.

The Flash drive will be used to transport the sensitive data between work and home and she is worried about loosing the drive and having the data stolen. Both machines, the one at home and the one at work, use the same Linux OS.

She has the following requirements:

She does not want to encrypt individual files as she has to deal with a large number of files.

She wants it to be as transparent as possible.

She thinks she will only need about 64MB at most.

She wants to also use the ash disk for transporting unencrypted les. Files that can be read on machines apart from her work and home machines.

A 64MB file that contains an encrypted file system, stored on the Flash drive would appear to be ideal|

a. Create a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

Document and explain in your own words every command you use (plus any command line options) and any con guration files you modify or create. Your descriptions of each operation need to show you understand the purpose of the operation.

Note: If you are uncertain why a particular command or command line option is required|ask! There is at least one step and command line option that you cannot understand from the information in the man page alone! It will require some research!

b. Things you must also address and explain:

how to ensure that the Flash drive has exactly the same mount point each time it is used on di erent machines. If it does not have the same mount point then how do you con gure cryptmount paths?

how to manage the file-system encryption keys.

c. Write an instruction sheet for the user so that she can make the modi cations to her home machine so that she can access the file on the ash drive containing the encrypted file system. Also explain how she would use the filesystem in her day-to-day work.

You may assume that she has root access to be able to confi gure her home machine to mount an encrypted file-system

Reference no: EM13380311

Questions Cloud

Since you have created the data objects for harbor view : since you have created the data objects for harbor view mooring you now need to create processes associated with each
Worldwide advertising inc referred to as wai has hired you : worldwide advertising inc. referred to as wai has hired you as an it consultant for implementing their windows network
1nbspunder the von neumann architecture a program and its : 1.nbspunder the von neumann architecture a program and its data are both stored in memory. it is therefore possible for
Question you have been asked to install an svn repository : question you have been asked to install an svn repository on a server. the svn will be remotely accessed using the
A user comes to you and explains that she needs some form : a user comes to you and explains that she needs some form of encrypted file system to store sensitive information on a
Questionon modern networked computers maintaining the : questionon modern networked computers maintaining the correct time on each machine is important. computers on a lan or
Exercise 1the following is a fragment of an xml document : exercise 1the following is a fragment of an xml document instance. identify all the places where it fails to match the
Question 1 write a program that can be used as a math tutor : question 1 write a program that can be used as a math tutor. the program should display two random numbers between land
Create a text file that contains account number 9-digit : create a text file that contains account number 9-digit number type one of the two types current denoted by cu or

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the multicast

examine and discuss what the UDP does and its relationship to TCP - - - in what ways is it similar and different, and why (what applications) would we use UDP, and why can't a user program access IP directly.

  What will do to get deadline to receive a passing grade

What will do to get deadline to receive a passing grade? You have to complete and submit course project previous to the deadline to receive a passing grade for this course.

  Implementing an intrusion detection system

Your company is trying to decide whether to implement an intrusion detection system (IDS), or an intrusion prevention system (IPS).

  Short paper on your servers performance

A solid amount of statistics, you should write a short paper on your server's performance. Point out bottlenecks and analyze the data that you've gathered, as well as coming up with a few suggestions on how you may be able to increase performance

  Questiongiven a series of numbers that represent adding

questiongiven a series of numbers that represent adding fuel 2 and subtracting fuel 1 determine highest distance that

  Why this is basically a disaster recovery plan

How would you approach a backup and administration plan for the hypothetical situation described below. contain  any network administration systems that should be installed for remote access in the event of a network emergency. This is basically a..

  How to write code for selection sort, insertion sort

How to write code for selection sort, insertion sort. Using your performance of selection, bubble and insertion sort, add a counter in an appropriate place so as to measure the runtime of your code for example this capacity be a counter to track ..

  Questionin programming language c array names are not

questionin programming language c array names are not assignable variables. therefore we cant copy an array directly

  What is the throughput

Measurements of the slotted ALOHA channel with an infinite number of users show that 10 percent of the slots are idle.

  Generate and display on the console the elements

Generate and display on the console the elements of a one-dimensional array b[M] where each element of b[M] represents the average grade over the semester of each of the M students .

  Drawing the uml state diagram

In the chess game white and black make alternate moves. White takes first move. Both Black and White may finish the game: by winning, by giving up, by draw.

  Why we have a divide databases and data warehouse

Why we have a divide databases and data warehouse

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd