Using Disk Encryption
In this lab, you will exploit a Windows operating system using the Windows recovery console to view files and folders on the system without any type of password to the system. After using a disk encryption utility, you will no longer be able to view the files or folders on the system, thus securing the data from compromise when a user gets physical access to it.
Overview
Data integrity is one of the three pillars of the CIA triad (confidentiality, integrity, and availability). Using disk encryption will help to protect and secure data. A perfect example of this is the stolen laptop scenario. When a laptop is stolen, the data on the hard drive can be accessible to attackers under certain conditions. In this lab, you will see what the differences are for an “attacker” when data is not encrypted and when the data on the disk is encrypted.
OUTCOMES
In this lab, you will learn to:
- Examine a hard drive without encryption
- Encrypt a Windows partition
- Verify encryption