Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to password encrypt a hard drive.

Posted on 2013-11-07
7
Medium Priority
?
381 Views
Last Modified: 2013-12-09
I have a backup 3.5" 1tb hard drive. I need to know a way of encrypting the contents of this drive and require a password to access it. It does NOT have to be any sort of high level government super encryption. Just a format that would be EXTREMELY difficult for your average hacker / thief to crack. Any suggestions from an Expert that has had PERSONAL EXPERIENCE with a particular program? Must be easy to use and cost no more than $60. Free would be nice.
0
Comment
Question by:Need-a-Clue
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 36

Assisted Solution

by:Kimputer
Kimputer earned 200 total points
ID: 39629916
Take a look at Truecrypt, it's free.

http://www.truecrypt.org/docs/

You have the option to encrypt a whole hard drive, or you can just create a smaller container (basically, just a file), which you can mount as a drive letter.
Many many encryption methods too.
0
 
LVL 14

Assisted Solution

by:Andy M
Andy M earned 552 total points
ID: 39629925
You've also mentioned that it is used for backups. It may be worth looking into the backup software you are using (if any) as some of these have the option to encrypt the contents of the backups.
0
 
LVL 15

Accepted Solution

by:
Giovanni Heward earned 548 total points
ID: 39630055
Here's my recommendations:

Truecrypt
Symantec (PGP) Drive Encryption
BitLocker Drive Encryption

Whatever product you select, be sure to use dual-factor authentication, choosing between two of these categories:

something you know
something you have
something you are

For example, a strong password (something you know) used in conjunction with a WWPass PassKey or YubiKey (something you have)
0
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

 
LVL 27

Assisted Solution

by:Steve
Steve earned 700 total points
ID: 39698248
Hi @Need-a-Clue,

Before settling on a solution, consider how you use the drive as you mention it is a 'backup' drive. Do you use any specific software to 'backup' your system.

If you do, take care as encrypting the drive may stop the backup working (or slow it down)

If not, you are free to use pretty much any encryption and you have 2 basic options:
a) encrypt the whole drive
b) create an encrypted 'container' that sits on the drive and cannot be opened without the correct password.

The weak point of any protection is the password though. All encryption systems can be broken if you choose a simple password.

Before trying complicated encryption software, consider option 'b' by simply using a password protected ZIP/RAR file.
Google it for yourself to see how hard it is to crack a password protected ZIP file using a brute force attack.... (which is incidentally the same way to crack a professionally encrypted container too)
Loads of tools exist but they all do it in the same way.....

As long as you use a long, complicated password it would take ages to crack and is deemed 'uncrackable' within reasonable timescales.


If proper encryption helps you sleep better however, I agree with Kimputer that Truecrypt is one of the simplest options as it can do both types of encryption as above and is very reliable.

It's good and straight forward, but the same brute force attacks that work on ZIP files will also work on Truecrypt containers/disks, so make sure you choose a good password.

See the section '62 characters' on the site below so see how long a password between 2-8 characters might take to crack if you used upper/lower case letters, numbers.

Reference:
http://www.lockdown.co.uk/?pg=combi
0
 
LVL 15

Expert Comment

by:Giovanni Heward
ID: 39698433
The weak point of any protection is the password though. All encryption systems can be broken if you choose a simple password.

Precisely why two-factor authentication is so highly recommended.

something you have combined with something you know
My YubiKey is to the far right.

Another suggestion is to reference a file or passphase (a complete sentence or paragraph of your choosing) and perform a SHA-256 hash against it (could combine with a salt for added measure.)  You'd then use the SHA-256 hash as your actual password.
0
 

Author Closing Comment

by:Need-a-Clue
ID: 39705206
THANK YOU SO MUCH!!! I feel that I have received a mini education on passwords and truly appreciate each response! I had NO idea how complicated this subject is and how vulnerable people are. I appreciate ALL you EXPERTS! I apologize for the long response time. Health problems.
0
 
LVL 15

Expert Comment

by:Giovanni Heward
ID: 39706179
Your welcome!  Thanks for the points.

Here's a chart which shows various authentication methods and strengths.

auth strength
You can see a password is the weakest method.
0

Featured Post

ATEN's HDBaseT Presentation at InfoComm 2017

Hear ATEN Product Manager YT Liang review HDBaseT technology, highlighting ATEN’s latest solutions as they relate to real-world applications during her presentation at the HDBaseT booth at InfoComm 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hi there, This article summarizes what you need if you are going to set up your home or small business Network Attached Storage (NAS) to be accessible from the internet. Of course there are configuration differences based on your NAS or router ma…
On Beyond Tools A conversation I recently had with the DevOps manager of a major online retailer really made me think about DevOps monitoring tools (https://www.onpage.com/devops-incident-management-tool/). The manager and I discussed how sever…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question