Introduction
Protecting sensitive information
()
Strategies for securing information
()
Important disclaimers
()
1. Sensitive Information in Files
File metadata
()
File integrity
()
Obscuring information in files
()
Securely deleting files
()
File system permissions
()
2. Encrypting Files
Shared key and public key encryption
()
Software-specific file protection
()
File encryption with Kleopatra on Windows or Linux
()
File encryption with GPG Suite on macOS
()
3. Encrypting Disks and Disk Images
Encrypted disks and disk images
()
Encrypted disk using BitLocker on Windows
()
Encrypted disk image using BitLocker on Windows
()
Encrypted disk using FileVault on macOS
()
Encrypted disk image using Disk Utility on macOS
()
Encrypted disk using LUKS on Linux
()
Encrypted disk image using LUKS on Linux
()
Cross-platform encrypted disk with VeraCrypt
()
Cross-platform encrypted disk image with VeraCrypt
()
4. Secure Practices
Employing secure practices
()
Ensuring security of web connections
()
Understanding VPN
()
Encrypted email
()
Security of cloud storage
()
Ex_Files_Security_Tips_Protect_Sensitive_Info.zip
(3.2 MB)