logo

Threats and Vulnerabilities of TrueCrypt Software

Communicate and demonstrate the threats and vulnerabilities inherent within TrueCrypt and recommend an alternative product in line with best cyber security practices.

9 Pages2195 Words84 Views
   

Added on  2023-01-12

About This Document

This report discusses the threats and vulnerabilities of TrueCrypt software and analyzes why it should be stopped. It also justifies an alternative open source product for ABS and explores symmetric and asymmetric encryption. Additionally, it provides a test plan for implementing best cyber security practices.

Threats and Vulnerabilities of TrueCrypt Software

Communicate and demonstrate the threats and vulnerabilities inherent within TrueCrypt and recommend an alternative product in line with best cyber security practices.

   Added on 2023-01-12

ShareRelated Documents
Truecrypt Software
1
Threats and Vulnerabilities of TrueCrypt Software_1
Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Discuss about the threat and vulnerabilities inherent TrueCrypt, analyse that should stop using
TrueCrypt software......................................................................................................................3
Justified an alternative open source product for ABS, identify symmetric and asymmetric
encryption....................................................................................................................................4
Develop test plan to use best cyber security practice and how performed function without any
issues............................................................................................................................................5
Test result or outcome.....................................................................................................................6
CONCLUSION................................................................................................................................7
REFERENCES................................................................................................................................8
2
Threats and Vulnerabilities of TrueCrypt Software_2
INTRODUCTION
The report is based on TrueCrypt software that mainly used for establishing and maintaining
on-fly-encrypted drive. It means that data is automatically decrypted or encrypted right before
they are saved and loaded without any intervention. It is mainly useful for migrated the existing
data, identified that software is not completely secure and contain unfixed security issues. The
report will discuss about the different threats, vulnerabilities that inherent TrueCrypt and also
analyse after stop using within data storage. Furthermore, it is mainly focused on the identifying
another product for company which always maintain both asymmetric as well as symmetric
encryption. However, it will design test plan to use in cyber security aspects where how they will
perform function in proper manner.
PART -1
Discuss about the threat and vulnerabilities inherent TrueCrypt, analyse that should stop using
TrueCrypt software.
TrueCrypt is the most popular software that will perform different task within the system.
It happens shortly after Anonymous handlers pulled the overall plugin in the system performance
(Balavivekan and han, 2019). In most of cases, both threat and vulnerabilities are critically
affecting on the overall system.
In ABS, Many attacker could abuse vulnerability in which TrueCrypt software is not
properly validate the driver letter. It also used the symbolic link for mounting the large volumes.
In this way, it become easier for attacker to leverage running process and get privileges from
administrator. So that it can be identified that TrueCrypt is risk software and not completely
protect in term of security as well as privacy (AliShiaeles and Kontogeorgis, 2019).
In ABS Company, it is to be consider as critical issue since any processor call TrueCrypt
driver. It means that process can get privileges and exploited through malware which helping to
access data in machine. There are two different ways to identify that True Crypt software bad for
ABS Company.
3
Threats and Vulnerabilities of TrueCrypt Software_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) Overview of Cyber Security
|8
|1545
|60

Computer Security - (Assignment)
|15
|2875
|18

Cyber Security: Vulnerabilities, Exploitation, and Security Controls
|10
|2384
|453

Summary of Attack | Computer and Network Security
|7
|1353
|29

Contemporary World Application 2022
|10
|541
|10

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274