Linux Security
    Linux Security
    Linux Security

    Best File and Disk Encryption Tools For Linux

    Date
    773
    Posted By
    LS Hmepg 337x500 34

    Most of us are familiar with Microsoft Windows or macOS - these OSes dominate the personal computing space. But the OS that is taking over the world isn’t owned by Microsoft, Apple, or any tech company for that matter. In fact, the most popular OS in the world today isn’t owned by anyone. It’s the completely open-source Linux operating system.

     

    What is Linux?

    While many people still aren’t familiar with Linux, they are familiar with many of the products and services that are built on the Linux platform. 

    The vast majority of the world’s most popular applications, such as Google, Facebook, Pinterest, and even Wikipedia, all run on Linux. According to W3techs, over 70 percent of all web servers are powered by a Linux or Linux-like operating systems, such as Unix

    Google’s Android OS for mobile devices, which powers over 86 percent of all smartphones and tablets in the world, is built on Linux. 

    Linux is also built into the firmware of many pieces of hardware from routers to automobiles including Tesla, Mercedes, and Toyota vehicles. 

    Many IT professionals and Managed IT Services consider Linux to be one of the key catalysts of the cloud itself as it’s open-source nature allows for an easy and seamless virtualization of physical IT infrastructure.  

    It’s no wonder Linux has completely conquered the data center sector. Today, the vast majority of data centers run on Linux or Linux-like platforms, and Linux runs much of the world’s enterprise data. 

    To say Linux dominates the cloud would be an understatement. Linux IS the cloud for a good chunk of consumers and businesses around the world.

    It’s no wonder then that Linux is now also the preferred operating system for most enterprise operations outside of personal computing devices running Windows or macOS. 

    When it comes to IT infrastructure, such as servers, Linux is king.

     

    Why Would Enterprises Use Linux?

    What makes Linux such an appealing OS for enterprise purposes is its open-source nature. 

    Unlike proprietary software such as Microsoft’s server solutions which have high licensing fees, Linux is freely available to anyone. More importantly, Linux’s core components can be easily edited, swapped out, or totally replaced by a user with the appropriate skills. This makes Linux amazingly customizable and adaptable to different businesses' needs and requirements.

    The benefit of employing a Linux-based distribution include:

    • Free
    • Open-source
    • Widespread and accessible availability of support resources
    • Cloud computing & storage standard
    • Easy scalability
    • A high degree of reliability
    • Supports multitasking and cooperative work
    • Not hardware intensive
    • Highly secure

     

    Linux & Cybersecurity

    Many IT and cybersecurity experts consider Linux to be the safest, most secure operating system available to the world today. 

    Because Linux is open-source, anyone can review it and ensure that there are no bugs or exploitable backdoors built into the OS. The same cannot be said of proprietary operating systems such as Microsoft’s Windows or Apple’s macOS platforms. 

    While both Microsoft and Apple may have a large team of well-resourced, professional developers working on security issues, no team of coders can compare to the sheer number of Linux user-developers around the world. 

    Linux-based systems also benefit from a more secure user privileges hierarchy that discourages social engineering attacks, such as malicious email attachments. 

    Its incredible distribution diversity also makes Linux a relatively unattractive target for cyber thieves in comparison to proprietary OSes. 

    Linux comes in various forms and packages from Ubuntu to Debian to Gentoo just to name a few. Because Linux comes in so many different flavors and segmented audiences, it is much more difficult for a cybercriminal to develop a single, effective virus or piece of malware that can affect many users. 

    Proprietary competitors, on the other hand, come in just one or two flavors. Windows, for example, is a prime example of this “monoculture effect”. It is much more profitable, and therefore attractive, for hackers or criminal organizations to develop an attack against Windows, which has a comparably much, much larger user base running identical OSes.

     

    Top 5 Linux File & Disk Encryption Tools

    While Linux-based systems are generally considered to be more resistant to cyberattacks and cybercrime, they are not completely invulnerable to a determined intruder. 

    The following are five of our favorite file and disk encryption tools to keep your important enterprise information safe from prying cybercriminals.

     

    7-Zip

    7-Zip offers strong command line encryption on Linux. Many people are familiar with 7-Zip as an archiving and zipping utility. However, for Linux user-developers, 7-Zip also offers a suite of robust encryption tools intended to keep your data safe and secure.

    To find out more about how to encrypt files and data with 7-Zip on your Linux distribution, check out this excellent TechRepublic article.

     

    Tomb

    Tomb is an excellent, easy-to-use, and minimalist command line encryption tool popular among Linux user-developers. Like Linux itself, Tomb is also totally free and open-source.

    One of the primary features of Tomb is its ability to generate encrypted storage vaults to be opened and closed using a password chosen by the user. These so-called “tombs” are like a locked folder that can be safely transported and hidden in a filesystem away from malicious users. Unfortunately, Tomb does not have a graphical user interface (GUI) and relies on command line input in order to function.

    Learn more about Tomb here.

     

    Cryptmount

    Cryptmount allows users to not only protect important file systems information but also swap system space. Multiple encrypted file systems can be “mounted”, or made active, or “unmounted”, or deactivated, depending on the users’ immediate needs. This is particularly useful when you want to work in an encrypted environment without having to mess around with your system’s inbuilt partitions.

    Like the other disk encryption tools above, Cryptmount relies on passphrases to maintain operational security. A strong passphrase will go a long way towards rebuffing cyberattacks and hacking attempts.

    Read about how to employ Cryptmount here.

     

    Gnu Privacy Guard (GnuPG or GPG)

    GnuPG, also known as GPG, is a unique hybrid encryption tool that not only employs conventional symmetric-key cryptography but also uses public-key cryptography. This two-prong approach to encryption helps speed up the encryption process without compromising OS security.

    GnuPG is popular among journalists who use the tool to encrypt important documents and protect the identities of their sources.

    GnuPG operates under the GNU General Public License (GPL). You can get GnuPG for free on their website here.

     

    Dm-crypt

    Dm-crypt is great for encrypting entire disks of information, including removable media such as USB sticks, internal OS partitions, as well as individual files. In fact, some Linux distributions even allow Dm-crypt to encrypt and secure root system files. Because Dm-crypt only deals with transparent encryption of block devices, it is much more flexible than other encryption tools.

    Dm-crypt operates under the GNU General Public License (GPL). Read more about encrypting your disk partitions here.

    About the Author

    Stephen Wright

    https://lh3.googleusercontent.com/DF2fAjBz5CONbzSDFgiii4mfcKchF96vk2coCXju_VpL4uoBIUqkpT4t1Hh5lrBtMKNKmZ0QJpWYYU_2Y2od_0CPjGY0DS7l97-t_rGIz9qCaJjR786DHin1xrqenRwx2WNB2JV2

    Stephen Wright is the founder and CEO of Wright Business Technologies. He is responsible for the overall success of the company, clients, employees, and vendor partners who support the business. Stephen graduated from Texas Tech University with a degree in business management and established Wright Business Technologies in 1992. He later earned his MBA, also from Texas Tech University.

    Advisories

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.