For my topic I have selected to create instructions on how to use the open source software program TrueCrypt to create a hidden and encrypted virtual drive for storing sensitive files. This topic is legitimate and necessary because information, stored on a computer as data, is becoming a businesses most guarded asset. TrueCrypt provides government grade 256-bit AES file encryption. In theory it would take the current world's fastest super computer longer than the time-span of the universe to guess at the key. Writing instruction sets on the program's use will enable two differing audiences—an expert IT Staff person and a novice business manager effectively secure their sensitive business data.
I am credible to cover this topic because I'm a Computer Technology major that has used TrueCrypt personally for years, and have implemented it in a server environment for a business. I understand the encryption algorithms used by TrueCrypt to scramble the data, and understand the advanced features an expert IT person might be looking to utilize when trying to not only encrypt, but hide data as well. TrueCrypt actually provides two levels of plausible deniability, which in this context means: if someone tried to force you to reveal the password to the data, you could deny the hidden drive even exists. This is possible because the encrypted data actually cannot be distinguished from random data—to an observer, both appear the same.
The first audience this is targeted at is the expert IT staff person looking for a file encryption solution for their business' needs. This user needs to know TrueCrypt's advanced functionality described above, specifically how to ensure file security and plausible deniability, and how to utilize keyfiles—a file that contains the private key, to unlock data. With keyfiles, not even knowing the key is enough, you also have to have a copy of the file to decrypt data from the drive. This user expects the documentation to be brief and have headings where information on individual advanced features can be referenced. As this user already has a working knowledge of how recent public key cryptography works, they are more concerned with a proper implementation of the encryption scheme that maximizes security.
The second audience is targeted at the novice small business manager with no on-staff IT expert. This user simply needs to follow step-by-step instructions on how to create a virtual encrypted drive, mount it, and encrypt sensitive files on it. They are much less concerned with providing a maximum security solution with plausible deniability, as just performing the default creation of an encrypted drive will still use 256-bit AES government grade encryption, and will meet their information security needs. This user will expect a detailed walkthrough showing step-by-step the tasks required to implement this encryption solution.
Since this project's format needs to be outside of the "8 1/2 by 11" paper format, I propose to create an XHTML/CSS web layout that provides these instructions sets for this audience. Possible graphics include screenshots from the setup wizard when creating a virtual encrypted drive, and general screenshots of the program and its advanced functions. As a professional web designer, I can incorporate these graphics into the page in an elegant layout that allows both audiences to extract the technical information they need to install and configure TrueCrypt to meet their needs.
Instructor Feedback: Zephyrus
This is a most excellent proposal, Jack. I especially appreciate the specific audiences you have mind. You have differentiated them both in terms of knowledge and experiences as well as their physical (and even economic) context. This level of sophistication should serve you well as you begin drafting your instruction sets. In fact, you have already begun to differentiate your approaches: the expert will receive instructions focused on the implementation of a specific solution and the novice will receive a comprehensive walk-through. I think this will insure that your sets are different enough and that both are necessary. It is important that you produce two (obviously) distinct instruction sets. The difference we are looking for is not one of degree (that is, the expert set is simply a smaller version of the novice set), but one of kind (the expert set is qualitatively different from the novice set). I think the online delivery method is a good choice as well.