logo

Threats and Vulnerabilities of TrueCrypt Software

   

Added on  2023-01-12

9 Pages2195 Words84 Views
 | 
 | 
 | 
Truecrypt Software
1
Threats and Vulnerabilities of TrueCrypt Software_1

Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Discuss about the threat and vulnerabilities inherent TrueCrypt, analyse that should stop using
TrueCrypt software......................................................................................................................3
Justified an alternative open source product for ABS, identify symmetric and asymmetric
encryption....................................................................................................................................4
Develop test plan to use best cyber security practice and how performed function without any
issues............................................................................................................................................5
Test result or outcome.....................................................................................................................6
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
2
Threats and Vulnerabilities of TrueCrypt Software_2

INTRODUCTION
The report is based on TrueCrypt software that mainly used for establishing and maintaining
on-fly-encrypted drive. It means that data is automatically decrypted or encrypted right before
they are saved and loaded without any intervention. It is mainly useful for migrated the existing
data, identified that software is not completely secure and contain unfixed security issues. The
report will discuss about the different threats, vulnerabilities that inherent TrueCrypt and also
analyse after stop using within data storage. Furthermore, it is mainly focused on the identifying
another product for company which always maintain both asymmetric as well as symmetric
encryption. However, it will design test plan to use in cyber security aspects where how they will
perform function in proper manner.
PART -1
Discuss about the threat and vulnerabilities inherent TrueCrypt, analyse that should stop using
TrueCrypt software.
TrueCrypt is the most popular software that will perform different task within the system.
It happens shortly after Anonymous handlers pulled the overall plugin in the system performance
(Balavivekan and han, 2019). In most of cases, both threat and vulnerabilities are critically
affecting on the overall system.
In ABS, Many attacker could abuse vulnerability in which TrueCrypt software is not
properly validate the driver letter. It also used the symbolic link for mounting the large volumes.
In this way, it become easier for attacker to leverage running process and get privileges from
administrator. So that it can be identified that TrueCrypt is risk software and not completely
protect in term of security as well as privacy (AliShiaeles and Kontogeorgis, 2019).
In ABS Company, it is to be consider as critical issue since any processor call TrueCrypt
driver. It means that process can get privileges and exploited through malware which helping to
access data in machine. There are two different ways to identify that True Crypt software bad for
ABS Company.
3
Threats and Vulnerabilities of TrueCrypt Software_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents