Difference between revisions of "User:Helixgroup"

From ForensicsWiki
Jump to: navigation, search
m
m
(25 intermediate revisions by 5 users not shown)
Line 1: Line 1:
''The danger in using a wiki as a collaboration tool is that other people will edit it. For examlpe, the stuff on cryptographic file systems should be on that page, not here.''
+
''The danger in using a wiki as a collaboration tool is that other people will edit it.  
  
=== Cryptographic File System: ===
+
Information on cryptographic file system was moved to [[File Systems#Cryptographic File Systems]]
  
[http://http://www.crypto.com/papers/cfskey.pdf|Key Management in an Encrypting File System], Matt Blaze, USENIX Summer 1994 Technical Conference, Boston, MA, June 1994.
 
  
[http://http://www.crypto.com/papers/cfs.pdf|A Cryptographic File System for Unix], Matt Blaze, Proceedings of the First ACM Conference on Computer and Communications Security, Fairfax, VA, November 1993.
 
 
[[User:Lenageraghty|Lenageraghty]] 22:08, 7 November 2005 (EST)
 
  
 
=== Vendor's product overview: ===
 
=== Vendor's product overview: ===
Line 14: Line 10:
 
Network Appliance: http://www.netapp.com/ftp/decru-fileshredding.pdf
 
Network Appliance: http://www.netapp.com/ftp/decru-fileshredding.pdf
  
 +
NetApps DataFort: http://www.decru.com/products/pdf/dsEseries.pdf
 +
 +
Decru Lifetime Key Management: http://www.decru.com/products/ltkm.htm
 +
 +
Decru Whitepaper: http://www.forensicswiki.org/images/6/6f/Securing_Storage_White_Paper.pdf
 +
 +
Price for Decru DataFort E510 1.6 for NAS: http://infosecuritymag.techtarget.com/ss/0,295796,sid6_iss346_art680,00.html
 +
 +
DecruDataFort E440: http://www.computerworld.com/hardwaretopics/storage/story/0,10801,78766,00.html
  
 
[[User:Lenageraghty|Lenageraghty]] 22:08, 7 November 2005 (EST)
 
[[User:Lenageraghty|Lenageraghty]] 22:08, 7 November 2005 (EST)
  
=== Useful site: ===
+
=== SAM Useful TCFS site: ===
  
 
Transparent CryptoGraphical file system: http://www.tcfs.it/index.php?pc=2
 
Transparent CryptoGraphical file system: http://www.tcfs.it/index.php?pc=2
  
[[User:Lenageraghty|Lenageraghty]] 22:10, 7 November 2005 (EST)
+
TCFS intro: http://www.linuxjournal.com/article/2174
 +
 
 +
--[[User:Samlam|Samlam]] 19:56, 13 November 2005 (EST)
 +
 
 +
=== ERIC Seagate new offerings: ===
 +
Full Disk Encryption: http://www.eweek.com/article2/0,1759,1825740,00.asp
 +
 
 +
Seagate product specification: http://www.seagate.com/content/docs/pdf/marketing/PO-Momentus-FDE.pdf
 +
 
 +
 
 +
[[User:Samlam|Samlam]] 12:10, 13 November 2005 (EST)
 +
 
 +
=== Cryptographcial File Systems: ===
 +
[[File Systems#Cryptographic File Systems]] Readings on crytographical file systems.
 +
=== Some Questions / Notes from BJ===
 +
I added to the existing outline below.  We only get 15 pages max, so we might have to limit ourselves to 2 pages (3 tops) per EFS, so there might be too many items for each EFS listed, but I think it would be good for us to be consistent and have the same items in each EFS.
 +
 
 +
I think we should start filling out what we can in the outline during this week, so that we can "refine as we go". 
 +
 
 +
Please make sure and add your citations, also.  Do not worry about format; we will do that later; but make sure all the information is there.
 +
 
 +
=== Suggestion of outline : ===
 +
*Introduction (BJ)
 +
**Definition of an Encrypting File System
 +
**Purpose/Goal of an EFS
 +
***Purpose: to add an additional layer of security, controlled by the user, over that user's data
 +
***Goal: to allow users to feel confident the data placed in the EFS cannot be compromised.
 +
**Overview of General Workings
 +
***(description of common functionality and common processes to all or most EFS)
 +
***You have data in memory, you want to save it to disk, you only want "authorized" people to see it; not even system administrators and/or backup operators
 +
***You control access by "owning" the key
 +
***Key is generated (somehow)
 +
***There is overhead in the process of encrypting/decrypting (unavoidable)
 +
**Overview of Common Usage
 +
***Maybe some categories of users and what they are looking for:
 +
***"business critical applications" like databases, etc. where business relies on data being available and secure
 +
***"business users" like managers who want to secure employee reviews, HR people wanting to secure salary information, etc.
 +
***"casual users" people who just want to make sure their data is secure.
 +
**The currently available systems (market share?)
 +
**Why we choose CFS TCFS and Network Applicances
 +
*Study of 4 systems in depth, including why this system is selected for study.
 +
**CFS (LENA)
 +
***Overview
 +
****When Developed
 +
****Platform(s)
 +
****Current Version
 +
***Key Management
 +
***Ease of Use for End Users
 +
***Legal Issues
 +
***Failure Modes
 +
***Challenges in Installation/Use by System Administrator
 +
***Performance
 +
***Cost
 +
***Conclusion (?? what would that be??)
 +
**TCFS (SAM)
 +
***Overview
 +
****When Developed
 +
****Platform(s)
 +
****Current Version
 +
***Key Management
 +
***Ease of Use for End Users
 +
***Legal Issues
 +
***Failure Modes
 +
***Challenges in Installation/Use by System Administrator
 +
***Performance
 +
***Cost
 +
***Conclusion (?? what would that be??)
 +
**Network Appliance DataForte and Seagate (ERIC)
 +
***Overview
 +
****When Developed
 +
****Platform(s)
 +
****Current Version
 +
***Key Management
 +
***Ease of Use for End Users
 +
***Legal Issues
 +
***Failure Modes
 +
***Challenges in Installation/Use by System Administrator
 +
***Performance
 +
***Cost
 +
***Conclusion (?? what would that be??)
 +
**Windows EFS (BJ)
 +
***Overview
 +
****When Developed
 +
****Platform(s)
 +
****Current Version
 +
***Key Management
 +
***Ease of Use for End Users
 +
***Legal Issues
 +
***Failure Modes
 +
***Challenges in Installation/Use by System Administrator
 +
***Performance
 +
***Cost
 +
***Conclusion (?? what would that be??)
 +
*Common Issues/Problems (ALL)
 +
**Impact on computer forensics
 +
**Impact on end-users (i.e. what if you are away on a business trip and you have to go to the hospital and all of your files are encrypted on your laptop?) (or even worse, what if you die and all your financial information is encrypted?)
 +
**Impact on business owners (e.g. what if an employee quits and all that person's data files, contact info, etc. are encrypted)
 +
*Future (ALL)
 +
**What would be useful to add or remove
 +
**How we would accomplish the changes we suggest
 +
*Conclusion. (ALL)
 +
 
 +
[[User:Lenageraghty|Lenageraghty]] 08:36, 11 November 2005 (EST)
 +
 
 +
=== Questions : ===
 +
* What systems are currently available ?
  
 +
[[User:Lenageraghty|Lenageraghty]] 08:48, 11 November 2005 (EST)
  
 
=== Suggestions/Questions/Outline ?: ===
 
=== Suggestions/Questions/Outline ?: ===
 
* Solutions from other storage vendors.
 
* Solutions from other storage vendors.
 
* Desirable features for a cryptographical file system.
 
* Desirable features for a cryptographical file system.
** cost
+
* cost
 
** performance
 
** performance
 
** total solution for end-users
 
** total solution for end-users
 
** Key management for cryptographical file system
 
** Key management for cryptographical file system
 
** Ease of use by end-users
 
** Ease of use by end-users
 +
** Failure modes
 +
** Challenges in using/installing
  
 
[[User:Lenageraghty|Lenageraghty]] 22:48, 7 November 2005 (EST)
 
[[User:Lenageraghty|Lenageraghty]] 22:48, 7 November 2005 (EST)
Line 39: Line 152:
 
not very long, so you may want to focus on the three systems and do a
 
not very long, so you may want to focus on the three systems and do a
 
deep analysis.  Certainly some things to think about:
 
deep analysis.  Certainly some things to think about:
       Simpson's lecture where he talked about it
+
       Simson's lecture where he talked about it
 
       Failure modes of such systems
 
       Failure modes of such systems
 
       Challenges in using/installing
 
       Challenges in using/installing
  
[[User:Lenageraghty|Lenageraghty]] 00:15, 8 November 2005 (EST)
+
''comment from teacher:'' Please remember that this Wiki is publically accessible on the Internet. It's great if you can improve the resource for everbody. But do try to do that, rather than just creating your own space...

Revision as of 20:21, 14 November 2005

The danger in using a wiki as a collaboration tool is that other people will edit it.

Information on cryptographic file system was moved to File Systems#Cryptographic File Systems


Vendor's product overview:

Seagate FDE: http://www.seagate.com/docs/pdf/marketing/PO-Momentus-FDE.pdf

Network Appliance: http://www.netapp.com/ftp/decru-fileshredding.pdf

NetApps DataFort: http://www.decru.com/products/pdf/dsEseries.pdf

Decru Lifetime Key Management: http://www.decru.com/products/ltkm.htm

Decru Whitepaper: http://www.forensicswiki.org/images/6/6f/Securing_Storage_White_Paper.pdf

Price for Decru DataFort E510 1.6 for NAS: http://infosecuritymag.techtarget.com/ss/0,295796,sid6_iss346_art680,00.html

DecruDataFort E440: http://www.computerworld.com/hardwaretopics/storage/story/0,10801,78766,00.html

Lenageraghty 22:08, 7 November 2005 (EST)

SAM Useful TCFS site:

Transparent CryptoGraphical file system: http://www.tcfs.it/index.php?pc=2

TCFS intro: http://www.linuxjournal.com/article/2174

--Samlam 19:56, 13 November 2005 (EST)

ERIC Seagate new offerings:

Full Disk Encryption: http://www.eweek.com/article2/0,1759,1825740,00.asp

Seagate product specification: http://www.seagate.com/content/docs/pdf/marketing/PO-Momentus-FDE.pdf


Samlam 12:10, 13 November 2005 (EST)

Cryptographcial File Systems:

File Systems#Cryptographic File Systems Readings on crytographical file systems.

Some Questions / Notes from BJ

I added to the existing outline below. We only get 15 pages max, so we might have to limit ourselves to 2 pages (3 tops) per EFS, so there might be too many items for each EFS listed, but I think it would be good for us to be consistent and have the same items in each EFS.

I think we should start filling out what we can in the outline during this week, so that we can "refine as we go".

Please make sure and add your citations, also. Do not worry about format; we will do that later; but make sure all the information is there.

Suggestion of outline :

  • Introduction (BJ)
    • Definition of an Encrypting File System
    • Purpose/Goal of an EFS
      • Purpose: to add an additional layer of security, controlled by the user, over that user's data
      • Goal: to allow users to feel confident the data placed in the EFS cannot be compromised.
    • Overview of General Workings
      • (description of common functionality and common processes to all or most EFS)
      • You have data in memory, you want to save it to disk, you only want "authorized" people to see it; not even system administrators and/or backup operators
      • You control access by "owning" the key
      • Key is generated (somehow)
      • There is overhead in the process of encrypting/decrypting (unavoidable)
    • Overview of Common Usage
      • Maybe some categories of users and what they are looking for:
      • "business critical applications" like databases, etc. where business relies on data being available and secure
      • "business users" like managers who want to secure employee reviews, HR people wanting to secure salary information, etc.
      • "casual users" people who just want to make sure their data is secure.
    • The currently available systems (market share?)
    • Why we choose CFS TCFS and Network Applicances
  • Study of 4 systems in depth, including why this system is selected for study.
    • CFS (LENA)
      • Overview
        • When Developed
        • Platform(s)
        • Current Version
      • Key Management
      • Ease of Use for End Users
      • Legal Issues
      • Failure Modes
      • Challenges in Installation/Use by System Administrator
      • Performance
      • Cost
      • Conclusion (?? what would that be??)
    • TCFS (SAM)
      • Overview
        • When Developed
        • Platform(s)
        • Current Version
      • Key Management
      • Ease of Use for End Users
      • Legal Issues
      • Failure Modes
      • Challenges in Installation/Use by System Administrator
      • Performance
      • Cost
      • Conclusion (?? what would that be??)
    • Network Appliance DataForte and Seagate (ERIC)
      • Overview
        • When Developed
        • Platform(s)
        • Current Version
      • Key Management
      • Ease of Use for End Users
      • Legal Issues
      • Failure Modes
      • Challenges in Installation/Use by System Administrator
      • Performance
      • Cost
      • Conclusion (?? what would that be??)
    • Windows EFS (BJ)
      • Overview
        • When Developed
        • Platform(s)
        • Current Version
      • Key Management
      • Ease of Use for End Users
      • Legal Issues
      • Failure Modes
      • Challenges in Installation/Use by System Administrator
      • Performance
      • Cost
      • Conclusion (?? what would that be??)
  • Common Issues/Problems (ALL)
    • Impact on computer forensics
    • Impact on end-users (i.e. what if you are away on a business trip and you have to go to the hospital and all of your files are encrypted on your laptop?) (or even worse, what if you die and all your financial information is encrypted?)
    • Impact on business owners (e.g. what if an employee quits and all that person's data files, contact info, etc. are encrypted)
  • Future (ALL)
    • What would be useful to add or remove
    • How we would accomplish the changes we suggest
  • Conclusion. (ALL)

Lenageraghty 08:36, 11 November 2005 (EST)

Questions :

  • What systems are currently available ?

Lenageraghty 08:48, 11 November 2005 (EST)

Suggestions/Questions/Outline ?:

  • Solutions from other storage vendors.
  • Desirable features for a cryptographical file system.
  • cost
    • performance
    • total solution for end-users
    • Key management for cryptographical file system
    • Ease of use by end-users
    • Failure modes
    • Challenges in using/installing

Lenageraghty 22:48, 7 November 2005 (EST)

comment from TA (Joe)

That looks like some of the right inroads. Remember that the paper is not very long, so you may want to focus on the three systems and do a deep analysis. Certainly some things to think about:

      Simson's lecture where he talked about it
      Failure modes of such systems
      Challenges in using/installing

comment from teacher: Please remember that this Wiki is publically accessible on the Internet. It's great if you can improve the resource for everbody. But do try to do that, rather than just creating your own space...