Veracrypt 1
Veracrypt 1
Group members
Name Father Name No
Zahidurahman Matiurahman
• https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://sourceforge.net/projects
/veracrypt/files/VeraCrypt%25201.21/VeraCrypt%2520Setup%25201.21.exe/download&ved=2ahUKEwijqfz_
mK2GAxU8SvEDHeVpBwwQFnoECCkQAQ&usg=AOvVaw3PZg5ziuWIeWK97z735eqN
• (practical ) .
The benefits of using encrypted
volumes for storing sensitive files
securely
• Enhanced security
• Privacy protection
• Secure storage
• Flexibility : you can easily mount and dismount when
you needed.
• It gives you the Confidence on the security.
Mounting encrypted volumes …
• how encrypted volumes can be mounted, and dismounted?
( practical )
• Highlighting of the best practices for password management.
• Keep your encryption keys and passwords in a secure location
• Use strong and unique passwords and avoid using easily guessable
passwords.
• A strong password should be long, complex, and include a mix of
letters, numbers, and special characters
• Regularly update and change your passwords
• Avoid sharing your encryption keys or passwords
• Have a back up of your encryption keys.
• Be aware of social engineering attacks
How mounted volumes appear
• Once a Veracrypt volume is mounted, it appears as a
regular disk volume in your file explorer, such as
Windows Explorer or Finder. You can access and
modify its contents just like any other drive on your
system. You can copy, move, delete, or add files and
folders within the mounted volume. Any changes
made to the mounted volume will be encrypted and
saved securely.
considerations for selecting encryption algorithms
Encryption algorithms are mathematical formulas used to scramble
data to make it unreadable without the correct decryption key.
• Veracrypt offers several encryption algorithms but Some common
encryption algorithms include
• AES (Advanced Encryption Standard): A widely used symmetric
encryption algorithm known for its security and efficiency.
• Serpent: Another symmetric encryption algorithm with a high level of
security.
• Twofish….
Questions ?