Thursday, September 26, 2019
USB device encryption. Types of USB flash drives Essay
USB device encryption. Types of USB flash drives - Essay Example Corsair flash padlock Kingston data Traveler secure Ironkey secure Flash drive Lexar jumpdrive secure II Looks like pull-off cap with Numeric pad down the front Uses 256-bit AES hardware based encryption Uses AES,CBC-mode, 128-bit encryption Uses 256-bit AES encryption Has speed of 15.9MB/sec Speed of 20.2MB/sec Speed of 18MB/sec (4GB) 15.5MB/sec Has average read rate of 15.4MB/sec Read rate of 24MB/sec Read rate 25MB/sec 15.9MB/sec Price range between $27-$39 for 1GB Price from $60 for 512MB Price $149 for 4GB and $71.50 for 1GB Price ranges $15.48 for 1GB has five numbered buttons as entry to security No minimum characters required. Generate password to about 99 characters. 32 characters for name and password I would recommend Kingston data traveler secure flash drive. This is because it is small in size thus portable. Too its password protection and its data encryption are compatible with several operating systems such as windows 2000, windows XP and Win98SE. The flash device has high speed both read and write. It durability cannot be doubted. That is why there is a five year warranty on a device bought. Data protection is the base line of this device. It has a higher security levels. Its high memory also acts as advantage to this device as privacy edition can hold up to 8GB. Computer foot print Creating a new foot print Downey and Stein have outlined how to create a new foot print. In the library manager screen first choose create new footprint. Name the footprint appropriately using an appropriate name such as ââ¬Ëmybankâ⬠. Make a drawing of the outline in the zoomed window. Select save as and thereafter choose on create new library button. Create a new directory with the details about the bank accounts. Name the directory such as ââ¬Å"libraryâ⬠. This has to be separate from where the layout and capture files were initially stored. Give a name to the new library file such as ââ¬Å"homefileâ⬠. Save it in ââ¬Å"mybankâ⬠. At last th ere are two files ââ¬Å"homefileâ⬠that contain the foot print ââ¬Å"mybankâ⬠Using ones EID credentials, log into foot prints of your bank. Click on the new request button that appears at the top-left corner. The incident information has then to be filled. The notes should be through so as to supply ITS with enough information for quick identification and to easily resolve the issue. The contact information is updated in the contact information. The information can be modified as it may be appropriate so as to enable contact with the ITS. The data is then saved. The updates are received through the email or by logging into the footprint system. Data on the details will be displayed in a ââ¬Å"hours per dayâ⬠and ââ¬Å"days per monthâ⬠. Time/days location ISP provider processor RAM Computer IP 10-11.00 11-12.00 12-1300 The characteristics that will help identify the computer in use will include computerââ¬â¢s IP address, mother board details and also the n ame accorded to it operating system. If access into footprint data is attempted either from a different computer or different way from the characteristics given, access first of all will be denied. The second option will be where one will be asked for a password before accessing the information. The last one will be where an individual must register as members to gain access. HTTPS This is a combination of hyper text transfer
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.