Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.

Similar presentations


Presentation on theme: "Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1."— Presentation transcript:

1 Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1

2 Introductions Allen Monette Security Coordinator Office of Campus Information Security

3 Why are we here?

4

5 OCIS Brown Bag Series Worst Practices, or 10 Easy Steps to Loosing Your Data Protecting Your Laptop’s Data Using Your Laptop Safely on the Road Finding and Protecting Sensitive Data on Your Computer Protecting Data by Using Network and Server Scanning Tools

6 Effective Practices for Restricted Data Handling Risk Reduction Strategy Find It: Determine if you store or process restricted data. Are you at Risk? Delete It: If there is no business need for storing restricted data, securely delete it. Remove Risk Move It: If there is a business need for storing restricted data, move the data to a secure server for proper storage and handling. Transfer Risk Encrypt It: If there is a business need to store restricted data, encrypt the data. (Desktop Encryption) Mitigate Risk OR THEN Risk Reduction Strategies Risk Assessment

7 Why Encryption?

8 It’s 3am … Do you know where your laptops are? Full Disk Encryption protects against lost devices

9 Would you trust… this guy with your files? File and Folder Encryption protects specific data

10 How does it work?

11 File encryption Think of file encryption as a secret code A simple code: A=0 B=1 C=2 D=3 Etc A message: 7 4 11 11 14 22 14 17 11 3

12 Folder encryption Think of folder encryption as a safe deposit box

13 Full Disk Encryption Think of Full Disk Encryption like a bank vault

14 How does it really work?

15 File and folder Encryption Encrypts individual files or entire folders Requires authentication to decrypt and access the files

16 Full Disk Encryption Replaces the master boot record with a special pre- boot environment Encrypts the entire hard drive Preboot Authentication plus OS authentication Decrypts as files are used

17 How to choose between Full Disk and File/Folder?

18 When to use Full Disk Encryption Full Disk Encryption protects against lost devices

19 When to use file/folder Need an additional layer of security Need portability Need to support removable media

20 What is UW Madison doing?

21 Laptop/Desktop Encryption Project Full disk and file/folder encryption for PC Mac

22 Nice if you can get it

23 Product Selected

24

25 Where are we now? Installed on about 250 computers Registrar’s office, Financial Aid, Admissions, and UW Survey Center are leading the pack on installs UW Milwaukee purchasing their own licenses and running their own server Ready for more participants

26 How can I get Involved? Email Allen Monette amonette@wisc.edu Or Linda Pruss pruss@doit.wisc.edu

27 Questions?


Download ppt "Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1."

Similar presentations


Ads by Google