Upload
vijay-kumar
View
137
Download
0
Embed Size (px)
Citation preview
HOW I PROTECTIMPORTATNT DATA ON MY DEVICE
WITHOUT SPENDING MONEY ON SOFTWARES.
PRESENTED BY: VIJAY KUMAR
VIJAY KUMAR
AGENDA OF THIS WEBINAR
Overview on Data Protection
What is more important ‘Data vs. Money’?
Where should you put your important DATA?
What are the critical chances to lose data?
VIJAY KUMAR
EFS Encrypting Files System
Case studies of losing data circumstances.
Back up efs certificate or key and How to use it.
EFS Data Recovery
AGENDA OF THIS WEBINAR
Bitlocker Drive Encryption System Requirements
Turn on bitlocker
Turn on bitlocker without TPM
Turn on bitlocker GO
Quick access to Manage bitlocker
Turn off bitlocker
VIJAY KUMAR
Free software for EncryptionVeracrypt – Overviews
8 Reasons you should use Veracrypt
Veracrypt Traveler Disk
Create a Encrypted Container
Encrypt Non-System Partition
Yours “IMPORTANT DATA”
VIJAY KUMAR
• Documents belong to your identity
• Your bank documents.
• Your office documents.
• Documents consist sensitive information.
• Research Papers.
• Private Images or Videos
WHAT ARE THE CAUSES OFDAMAGE/LOST YOUR DATA?
VIJAY KUMAR
Physical Access of Storage Media
Lost/Stolen External Storage Media
Access of your Computer/Laptop – Local Data
System Failure
METHODS TO ENCRYPT DATA IN WINDOWS
VIJAY KUMAR
Encrypting File System [EFS] for files and folders
Bitlocker to Encrypt Drive/System Drive
Other Free third party Software's
OVERVIEW ON“ENCRYPTING FILE SYSTEM [efs]”
VIJAY KUMAR
Microsoft Encrypting File System (EFS) is an integral part of Microsoft Windows operating systems that enables users to protect their files against unauthorized access even from those who gain physical access to the hard disk or the computer that contains the encrypted files. Windows XP, 2003, Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012
CIRCUMSTANCES OF “LOSING ENCRYPTED DATA”
VIJAY KUMAR
EFS-protected disk inserted into a different PC
Deleted users or user profiles
User transferred into a different domain without EFS consideration
Account password reset performed by system administrator without EFS consideration
Damaged disk, corrupted file system, unbootable operating system
Reinstalled Windows or computer upgrades
Formatted system partitions with encrypted files left on another disk
WHAT IS NEXT“RESTORE EFS CERTIFICATE OR KEY”
VIJAY KUMAR
Solve “Access is denied” problem
DEMOSTRATION:
OVERVIEW ON BITLOCKER
VIJAY KUMAR
BitLocker provides you most protection of your data used way trusted platform module TPM version 1.2 a letter the TPM is a hardware component installed while computer manufacturers in the computer.
BITLOCKER:“SYSTEM REQUIREMENTS”
VIJAY KUMAR
• Your PC is hard drive must have to partition and The drive must be formatted with the NTFS file system.
• The drive must be not encrypted by differ operating system or another encrypted software.
• The computer must have a TPM version 1.2 or later if your computer does not have EPL you can still enable BitLocker with the requirement of removal device to save startup key.
• A computer with TPM must have TCG trusted computing group complaint BIOS
• Keep your computer connected with uninterrupted power supply throughout the entire process because this process is time-consuming depending the amount of data and drive size
VERACRYPT“KEY FEATURES”
VIJAY KUMAR
• Stops “cold-boot attacks” (encryption keys stored in memory)
• No backdoor access (complete security)
• Fixes security issues of TrueCrypt
• Can create hidden Container/partition/operating system
• Supports security (or cryptographic) tokens and smart cards
• Establishes on-the-fly encrypted volumes
• Prevents data leaks
• Protection against data theft
VERACRYPT“INSTALLATION & PORTABLE INSTALLATION”
VIJAY KUMAR
EQUIPPED YOUR WINDOWS WITH ADVANCE ENCRYPTION SOFTWARE
DEMONSTATION
VERACRYPT“CREATE FIRST ENCRYPTED CONTAINER”
VIJAY KUMAR
HOW TO USE ENCRYPTED CONTAINER CREATED BEFORE
DEMONSTATION