Avatar of Pau Lo
Pau Lo

asked on 

Encase and encryption

1) A couple of questions, is there any master list of what full disc encryption products the latest version of encase forensics "supports"?

2) What is the defintion in laymans management speak of support, i.e. if our security team get a PC in and find the drive is encrypted, how does the encase support kick in. For example if you just image that drive (never done this but seen one guy do it, it seems they attach it to a write blocker, file > add device > local device) and pick the neccesary drive, and then "acquire". But arent you just imaging then a drive of encrypted non human readable data, how does the encase support "decrypt" that drive so the image you acquire can be analyzed?
Digital ForensicsSecurityEncryption

Avatar of undefined
Last Comment
SirtenKen
ASKER CERTIFIED SOLUTION
Avatar of SirtenKen
SirtenKen
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of Pau Lo
Pau Lo

ASKER

Thanks. So if you buy encase forensic off the shelf does it come with the decryption modules or is that an add on you have to pay for on top of....
Avatar of SirtenKen
SirtenKen
Flag of United States of America image

The latest version 7 comes with EDS and other modules included:
http://www.guidancesoftware.com/forensic.htm#tab=2
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo