Solved

laptop stolen scenario.. bitlocker- how much can it help?

Posted on 2013-06-26
8
729 Views
Last Modified: 2013-06-28
if the laptop is stolen, and a database is in it.. the laptop has bitlocker..

does that guarentee 100% that the database will be secure? (if the hacker can break in the login regardless of bitlocker, then with windows authentication, they can read the database- and that is the main concern)
0
Comment
Question by:25112
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 45

Assisted Solution

by:Kent Olsen
Kent Olsen earned 100 total points
ID: 39279387
Bitlocker is a disk encryption tool.  The intent is that if you have user access to the computer, bitlocker decrypts the disk file(s) automatically for user access.  If you have any other access to, such as removing the drive and connecting it to a Linux or other windows computer, the files are encrypted and not available to the foreign O/S.

100% guarantee?  Probably not.  But it is standard AES encryption, and there is no known back door, even to law enforcement.  It's probably as close to 100% as you can get.


Kent
0
 
LVL 55

Assisted Solution

by:McKnife
McKnife earned 300 total points
ID: 39279760
Hi.

It depends. If you chose to secure Bitlocker with TPM and PIN, it's very secure. If only TPM, it's vulnerable to cold boot attacks (as would any other non-preboot-authentication-encryption be), see the Princeton university doing it here: http://www.youtube.com/watch?v=JDaicPIgn9U

So how exactly did you setup Bitlocker?
0
 
LVL 5

Author Comment

by:25112
ID: 39280082
hi - thanks- that helps to know..

i did not set up the machine.. how can i know if it is TPM or TPM+PIN?
0
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

 
LVL 55

Assisted Solution

by:McKnife
McKnife earned 300 total points
ID: 39280333
How die you start it? did you just turn it on or did you have to enter a PIN or provide a startup usb token?
0
 
LVL 5

Author Comment

by:25112
ID: 39281095
I just turn the laptop on and put regular windows authentication.. that's it.. i dont do any other steps.. but the person who gave it to me said bitlocked has been enabled.. but able to tell if it is the TPM or TPM+PIN
0
 
LVL 25

Assisted Solution

by:nickg5
nickg5 earned 100 total points
ID: 39283139
Ask the person who gave it to you if they did this process.........

Prior to enabling BitLocker on a computer with a TPM version 1.2 or later, you must initialize the TPM. The initialization process generates a TPM owner password, which is a password set on the TPM. You must be able to supply the TPM owner password to change the state of the TPM, such as when enabling or disabling the TPM or resetting the TPM lockout.
http://technet.microsoft.com/en-us/library/hh831507.aspx#BKMK_HaveTPM
0
 
LVL 55

Accepted Solution

by:
McKnife earned 300 total points
ID: 39283534
If it just starts, then it's 100% clear that it uses only the TPM. Normal thieves have no chance, thieves with knowledge of Bitlocker and the intent to get the data will use and succeed with the aforementioned clod boot attack http://www.youtube.com/watch?v=JDaicPIgn9U
0
 
LVL 5

Author Comment

by:25112
ID: 39286105
Thank you.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question