Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
dcc:itsol:veracrypt [2024/07/24 09:35] – old revision restored (2024/07/22 13:51) giuliodcc:itsol:veracrypt [2025/04/04 14:00] (current) – Minor changes alba
Line 1: Line 1:
-{{indexmenu_n>1}}+{{indexmenu_n>4}}
 ====== VeraCrypt Simplified User Manual for RUG employees ====== ====== VeraCrypt Simplified User Manual for RUG employees ======
  
-This is a simplified version of the VeraCrypt user manual created by the DCC using a Windows 10 system and is meant to guide the user through the installation of VeraCrypt, help decide what level of security is needed, and provide an easy to use, step-by-step diagram on how to obtain said security. Should there be any doubt on how to create an encrypted volume or how to manage it, please contact us at [[dcc@rug.nl|dcc@rug.nl]].+This is a simplified version of the VeraCrypt user manual created by the DCC using a Windows 10 system. It is meant to guide you through the installation of VeraCrypt, help you decide what level of security you need, and provide an easy to use, step-by-step manual on how to set up a VeraCrypt volume. Should you have any doubt on how to navigate this guide, please contact us at [[dcc@rug.nl|dcc@rug.nl]].
  
-**IMPORTANTPlease note that VeraCrypt provides a level of security that is determined by the user’s behavior as much as by the program itself. +**Note**We also offer regular workshops on VeraCrypt and its use.
-Read through the guide carefully and take note of what kind of behavior should be avoided or followed.**+
  
 +**IMPORTANT: Please note that VeraCrypt provides a level of security that is determined by the user’s behavior as much as by the program itself. Read through the guide carefully and take note of what kind of behavior you need to follow to guarantee your data stays both safe and secure. As a quick reminder:**
   * **DO NOT leave your machine unattended (especially when a VeraCrypt volume is mounted),**   * **DO NOT leave your machine unattended (especially when a VeraCrypt volume is mounted),**
   * **DO NOT cache your passwords or keyfiles needed to mount a VeraCrypt volume, and**   * **DO NOT cache your passwords or keyfiles needed to mount a VeraCrypt volume, and**
   * **FOLLOW THE GUIDELINES provided in this manual or the original VeraCrypt manual to the letter. You can find the original manual here: https://www.veracrypt.fr/en/Documentation.html**   * **FOLLOW THE GUIDELINES provided in this manual or the original VeraCrypt manual to the letter. You can find the original manual here: https://www.veracrypt.fr/en/Documentation.html**
  
-**Should you decide not to do so, VeraCrypt cannot guarantee the security of your data (nor can the DCC).** +**Should you decide not to follow best practices, VeraCrypt cannot guarantee the security of your data (nor can the DCC).**
  
 Throughout this manual, we will assume that you are going to install VeraCrypt on a Windows machine. There are versions of VeraCrypt available for Linux and MacOS as well, but they are beyond the scope of this guide. Should you want to install VeraCrypt on Linux or MacOS, please refer to the original VeraCrypt manual for more information. If you still have questions, contact us at [[dcc@rug.nl|dcc@rug.nl]]. Throughout this manual, we will assume that you are going to install VeraCrypt on a Windows machine. There are versions of VeraCrypt available for Linux and MacOS as well, but they are beyond the scope of this guide. Should you want to install VeraCrypt on Linux or MacOS, please refer to the original VeraCrypt manual for more information. If you still have questions, contact us at [[dcc@rug.nl|dcc@rug.nl]].
  
 +----
  
-==== What can you expect from VeraCrypt? ====+**Important Note**: Encryption is designed to prevent unauthorized access to data or a location in your file system. Your password is the way to prove you are authorized to access the data. If you lose your password, then **nobody will be able to recover the data** for you. Please **pay close attention** to where and how you manage your password(s). If you are in doubt, consider using a password manager.
  
-VeraCrypt is able to provide both encrypted volumes as well as encrypted operating systems. The idea behind such tools is to make it impossible to determine what data is stored in the volume/system and how big the data volume isIn order to do sohowever, VeraCrypt needs the user to follow some basic conduct rules in order to prevent potential attackers from guessing the hidden information.+VeraCrypt is useful for encrypting multiple files or a folder in your file system. If all you need to protect with encryption is a single Excel sheet with your pseudonymization keythen Excel has the functionality to encrypt that single file. For practicality reasonsonly use VeraCrypt if you know (or foresee) that you will need to encrypt multiple files. 
 + 
 +---- 
 + 
 +==== What can you expect from VeraCrypt? ====
  
-VeraCrypt also allows you to create hidden volume/system inside a decoy volume/system in order to hide information from an attacker, should they have managed to get access to your password/machine. This procedure requires assistance from the DCCas there are some risks to take into account when setting this up.+The DCC advises you to use VeraCrypt by creating VeraCrypt volume. The idea behind an encrypted volume is to hide the location of multiple files behind a single file name. The file itself will also have the maximum size of the volume, regardless of whether the volume is full or empty. This is done to make it impossible to determine what data is stored in the volume and how big the data volume is. For the data to stay safe and secureVeraCrypt needs you to follow some basic rules to prevent potential attackers from guessing the hidden information.
  
-The way VeraCrypt encrypts and decrypts data is explained in detail in its manual. The short version of it is that the encrypted volume appears to contain random data and is inaccessible until the user provides a password and the volume is mounted by VeraCrypt. The data contained in the volume is decrypted on the fly by VeraCrypt and stored in your RAM. This prevents sensitive data from ever being written to disk, where it might be left unprotected should anyone gain access to your machine. +The way VeraCrypt encrypts and decrypts data is explained in detail in its manual. The short version of it is that the encrypted volume appears to contain random data and is inaccessible until the user provides a password and the volume is mounted by VeraCrypt. The data contained in the volume is decrypted by VeraCrypt when and while you are working on it. The decrypted information is stored in your RAM and will be overwritten once you dismount VeraCrypt. Only the encrypted data is saved on disk. This prevents sensitive data from ever being written in a location where it might be left unprotected should anyone gain access to your machine. 
  
-[[dcc:itsol:veracrypt:installation| → Move to next step]]+[[dcc:itsol:veracrypt:installation| → Move to the next step]]