wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Full Disk Encryption

profile
Aditi Kute
Feb 11, 2024
1 Like
0 Discussions
128 Reads

Abstract:

As the reliance on digital storage and communication grows, the need for robust security measures becomes paramount. Full Disk Encryption (FDE) has emerged as a fundamental tool to protect sensitive information on storage devices. This research paper delves into the intersection of Full Disk Encryption and Digital Forensics, exploring the challenges, opportunities, and implications that FDE poses for digital forensic investigations. The paper discusses the impact of FDE on data acquisition, analysis, and interpretation, highlighting both the benefits and obstacles faced by digital forensic experts. Additionally, potential advancements and best practices in adapting forensic methodologies to handle FDE-protected systems are examined.

 

Introduction

Full Disk Encryption (FDE) is a security measure that encrypts the entire contents of a storage device, rendering it inaccessible without the correct decryption key. While FDE enhances data security, it presents unique challenges for digital forensic investigators aiming to retrieve and analyze information from encrypted devices.

Digital evidence plays a crucial role in modern investigations, offering valuable insights into criminal activity and misconduct. However, the widespread adoption of FDE has significantly complicated the collection and analysis of such evidence. FDE encrypts all data stored on a device, rendering it unreadable without the decryption key. This poses a significant obstacle for digital forensic investigators, who rely on access to unencrypted data to collect evidence and reconstruct events.

 

Full disk Encryption

Full-disk encryption (FDE) is a security method for protecting sensitive data at the hardware level by encrypting  all data on a disk drive. FDE automatically encrypts data and operating systems (OSes) to prevent unauthorized access.

Disk-level encryption safeguards data from getting into the wrong hands and is important for organizations that are following data security compliance regulations such as the Health Insurance Portability and Accountability Act or the general data protection regulation.

FDE is especially useful for desktops, laptops and mobile devices that can be physically lost or stolen. Even if the device is stolen, the encrypted data will be inaccessible to the thief. Because one key is used to encrypt the entire hard drive, FDE requires network administrators to enforce a strong password policy and provide an encryption key backup process in case employees forget their password or leave the company unexpectedly.

FDE works by automatically converting data on a hard drive into a format that can't be understood by anyone who doesn't have the key to undo the conversion. Specifically, the hard drive is converted from a readable plaintext to a ciphertext that isn't readable unless it's converted back to plaintext with a key. Without the proper authentication key, even if the hard drive is removed and placed in another machine, the data remains inaccessible. The encryption process is performed using encryption software or hardware that's installed on the drive. Some systems don't encrypt the master boot record -- the code that starts the OS loading sequence -- meaning that not everything on those devices is encrypted.

FDE is often installed on computing devices at the time of manufacturing. For example, FDE is enabled through features like BitLocker, which is included in certain Microsoft Windows versions, or FileVault, which is built into the macOS. BitLocker and FileVault enable users to recover lost passwords. BitLocker stores recovery information on Active Directory, and FileVault backs up encryption keys to Apple iCloud. Microsoft also offers Device Encryption on all Windows devices that protects data by encrypting the drive.

 

FORENSIC ACQUISITION OF FULLY ENCRYPTED DISKS

Forensic professionals continue to struggle with full-disk encryption. It might not be able to access evidence on encrypted disk volumes without first decrypting them. The standard procedure had always been to unplug the system, remove the disks, perform write-blocked imaging, and then analyze the image files. When a hard drive is completely encrypted, the digital forensic investigators have difficulty in finding the stored data and the investigative options are limited.

                One of the most important procedures in a digital forensic investigation is forensic imaging. Making an archive or backup copy of the complete hard disk is what it is all about. It is a storage file with all the data required to start the operating system. However, for this imaged disk to function, the hard drive must be used. Disk image files cannot be used to restore a hard drive since they need to be opened and loaded on the drive using an imaging program. Several disk images can be stored on a single hard drive. Flash drives with more storage space can also be used to store disk.

  FTK Imager, an open-source programmed from Access Data, is used to accurately duplicate the original evidence without actually changing it. Since the original evidence's image doesn't change, we may quickly copy data that can eventually be saved and subjected to additional analysis. The FTK imager also gives you access to an integrated integrity testing feature that creates a hash report that aids in comparing the hash of the original Evidence before and after the image was made of it.

 It is possible to decrypt a BitLocker protected disk by connecting the drive read-only to a forensic examination system running Windows Vista and providing a recovery password to BitLocker. Although data will still be encrypted at the physical level, a forensic acquisition tool can be use to acquire the logical volume in unencrypted form.

The creation of a forensic copy of a live system, if forensic investigators can gain access before the computer is turned off, is an alternative means of obtaining data from an encrypted drive. A live forensic replica can be obtained remotely using programmes like EnCase Enterprise and ProDiscover IR or from the console using programmes like X-Ways Capture and FTK Imager Lite running on external media.

The X-Ways Capture tool features a feature that checks for popular encryption systems and can produce a forensic duplicate of the decrypted drive. It can be launched from the command line of a live Windows or Linux machine.

 

 

 

  • Benefits of full-disk encryption
    Full-disk encryption offers the following advantages:

 

  • It requires no special attention from end users after they initially unlock their computer. When data is written, it's automatically encrypted, and when it's read, it's automatically decrypted.
  • Data can't be extracted without a device password and encryption key.
  • It helps protect data at rest against cyber attacks and data leaks.
  • Temporary files are also encrypted.
  • Users are authorized before the device boots.
  • FDE is faster than manual encryption methods, which are more time-consuming and less efficient.

 

  • Disadvantages of FDE:

 

  • The encryption and decryption process can slow down data access times, particularly when virtual memory is being heavily accessed.
  • If users forget their password and lose their recovery key, the device will be inaccessible to them, and they will be locked out just like an intruder.
  • Data in transit isn't protected, so data shared between devices and through email is still vulnerable to hacking.
  • The costs involved with FDE include the encryption hardware or software, as well as the time it takes to operate a computer with FDE.

 

 

 

 

 

Conclusion :

While FDE presents challenges for digital forensics, its benefits in data protection and compliance cannot be ignored. By understanding the complexities involved and adopting best practices, law enforcement and forensic professionals can navigate this evolving landscape effectively, ensuring both data security and successful investigations. Continuous collaboration and innovation are crucial for ensuring that digital evidence remains accessible and valuable in the age of pervasive encryption.

 

Refrences :

1] Alshehri, M., & Yasmi, H. (2019). The growing impact of full disk encryption on digital forensics: A comprehensive review. International Journal of Computer Network and Information Security (IJCNIS), 11(8), 75-82. https://www.researchgate.net/publication/234803189_The_impact_of_full_disk_encryption_on_digital_forensics

2] Carrier, B. (2005). The Sleuth Kit and Autopsy. Digital Forensics Toolset. https://www.sleuthkit.org/sleuthkit/

3] Garfinkel, T. (2006). Trapping a slipper server: An exercise in network forensics. Digital Investigation, 3(3), 194-203. https://www.researchgate.net/publication/251136233_Network_Packet_Forensics

4] National Institute of Standards and Technology (NIST). (2017). Special publication 800-131a: Recommendations for the use of cryptography in federal government systems. https://csrc.nist.gov/pubs/sp/800/131/a/r1/final

5] SANS Institute. (2020). Digital forensics and incident response (DFIR) essentials. https://www.sans.org/digital-forensics-incident-response/

6] The International Organization for Standardization (ISO). (2012). ISO/IEC 27001:2013: Information technology — Security techniques — Information security management systems — Requirements. https://www.iso.org/standard/27001

 


Comments ()


Sign in

Read Next

Sessions In OS.

Blog banner

Every body is beautiful

Blog banner

Boxing

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

BUFFER OVERFLOW_142

Blog banner

Cyber Security Control

Blog banner

Critical success factors

Blog banner

Constrained Management in IT

Blog banner

Platonic Solids

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Computer Security

Blog banner

Deadlocks

Blog banner

Know your Processors!

Blog banner

Race Condition in Operating Theatre

Blog banner

Microsoft Word

Blog banner

Fitness

Blog banner

Device driver

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Quality check in IT services

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Memory Management

Blog banner

Note Taker App

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Deadlock and Starvation

Blog banner

Modern operating system

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

What is Virtual Memory

Blog banner

IO Buffers

Blog banner

BharatPe

Blog banner

Compromising Mobile Platforms

Blog banner

How to Conquer Depression ?

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Monday. com App

Blog banner

Types of email

Blog banner

Raid

Blog banner

Online Education

Blog banner

INTRANET

Blog banner

Indian Culture and Tradition

Blog banner

Virtual machine.

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner