Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
dcc:itsol:veracrypt [2025/02/18 08:42] – [VeraCrypt Simplified User Manual for RUG employees] added note on excel encryption giulio | dcc:itsol:veracrypt [2025/04/04 14:00] (current) – Minor changes alba | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | {{indexmenu_n> | + | {{indexmenu_n> |
====== VeraCrypt Simplified User Manual for RUG employees ====== | ====== VeraCrypt Simplified User Manual for RUG employees ====== | ||
- | This is a simplified version of the VeraCrypt user manual created by the DCC using a Windows 10 system | + | This is a simplified version of the VeraCrypt user manual created by the DCC using a Windows 10 system. It is meant to guide you through the installation of VeraCrypt, |
- | **IMPORTANT: Please note that VeraCrypt | + | **Note**: We also offer regular workshops on VeraCrypt and its use. |
- | Read through the guide carefully | + | |
+ | **IMPORTANT: | ||
* **DO NOT leave your machine unattended (especially when a VeraCrypt volume is mounted),** | * **DO NOT leave your machine unattended (especially when a VeraCrypt volume is mounted),** | ||
* **DO NOT cache your passwords or keyfiles needed to mount a VeraCrypt volume, | * **DO NOT cache your passwords or keyfiles needed to mount a VeraCrypt volume, | ||
* **FOLLOW THE GUIDELINES provided in this manual or the original VeraCrypt manual to the letter. You can find the original manual here: https:// | * **FOLLOW THE GUIDELINES provided in this manual or the original VeraCrypt manual to the letter. You can find the original manual here: https:// | ||
- | **Should you decide not to do so, VeraCrypt cannot guarantee the security of your data (nor can the DCC).** | + | **Should you decide not to follow best practices, VeraCrypt cannot guarantee the security of your data (nor can the DCC).** |
Throughout this manual, we will assume that you are going to install VeraCrypt on a Windows machine. There are versions of VeraCrypt available for Linux and MacOS as well, but they are beyond the scope of this guide. Should you want to install VeraCrypt on Linux or MacOS, please refer to the original VeraCrypt manual for more information. If you still have questions, contact us at [[dcc@rug.nl|dcc@rug.nl]]. | Throughout this manual, we will assume that you are going to install VeraCrypt on a Windows machine. There are versions of VeraCrypt available for Linux and MacOS as well, but they are beyond the scope of this guide. Should you want to install VeraCrypt on Linux or MacOS, please refer to the original VeraCrypt manual for more information. If you still have questions, contact us at [[dcc@rug.nl|dcc@rug.nl]]. | ||
- | **Important Note**: If all you need to protect with encryption is a single excel sheet with your pseudonymization key, then excel has the functionality to encrypt that single file. If you know (or foresee) that you will need to encrypt multiple files, then using VeraCrypt is the better choice. | + | ---- |
- | ==== What can you expect from VeraCrypt? ==== | + | **Important Note**: Encryption is designed to prevent unauthorized access to data or a location in your file system. Your password is the way to prove you are authorized to access the data. If you lose your password, then **nobody will be able to recover the data** for you. Please **pay close attention** to where and how you manage your password(s). If you are in doubt, consider using a password manager. |
- | VeraCrypt is able to provide both encrypted volumes as well as encrypted operating systems. The idea behind such tools is to make it impossible to determine what data is stored | + | VeraCrypt is useful for encrypting multiple files or a folder |
+ | |||
+ | ---- | ||
+ | |||
+ | ==== What can you expect | ||
- | VeraCrypt also allows | + | The DCC advises |
- | The way VeraCrypt encrypts and decrypts data is explained in detail in its manual. The short version of it is that the encrypted volume appears to contain random data and is inaccessible until the user provides a password and the volume is mounted by VeraCrypt. The data contained in the volume is decrypted | + | The way VeraCrypt encrypts and decrypts data is explained in detail in its manual. The short version of it is that the encrypted volume appears to contain random data and is inaccessible until the user provides a password and the volume is mounted by VeraCrypt. The data contained in the volume is decrypted by VeraCrypt |
[[dcc: | [[dcc: |