Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – email a document safely.

Slides:



Advertisements
Similar presentations
Encryption Applications George Bailey Information Security Ivy Tech Community College Tech Day – Columbus, Indiana.
Advertisements

Click to edit Master title style Updates Aug updates – SMTPA authenticated server – alias addresses – Rapid Response Notification.
E MAIL CONFIGURATION. 1] Select option from main menu 2] Select account 3] Go to option menu & select New account 4] Start to create new.
Laptop Security in the current IT world W3 group.
ARMORINO Portable Privacy Platform. µcrypt µcrypt Armorino Information always has a value that constantly growing under pressure of new.
Yahoo Mail to Microsoft Exchange Beginning March 1- 2, 2014
Student Information System /SIS and other IT Services.
Division of Information Resources Collaborating with Office 365 Storage Options and Classifications.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Team Wolf Distributed, Consistent and Secure USB Storage Final Project Review Eddie Lai Matt Dube Sean Busch Zhou Zheng.
Secure Off Site Backup at CERN Katrine Aam Svendsen.
Princeton Collaborative Research Resources Feb. 18, 2011 Todd Hines Linda Oppenheim.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
1 Integrating ISA Server and Exchange Server. 2 How works.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Penn State University College Of Education Understanding College of Education Resources.
New Data Regulation Law 201 CMR TJX Video.
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
eScan Total Security Suite with Cloud Security
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
April 2014 LCCU Meeting We’ll answers members’ questions: –Choices for Backing Up to the Cloud – Idrive, OneDrive, Google Drive, Dropbox, Spideroak … –How.
Internet-Based Client Access
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Masud Hasan Secue VS Hushmail Project 2.
Securing Microsoft® Exchange Server 2010
A Digital Gateway Michele Reed Vice President and Director of Communications Missouri PTA.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Green Computing Sharing files to reduce printing.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
Internet of Things Top Ten. Agenda -Introduction -Misconception -Considerations -The OWASP Internet of Things Top 10 Project -The Top 10 Walkthrough.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Types of Electronic Infection
POP3
New Features v1.4. CPO New Features  Send File Link Improvements  Send File Link via mobile phone  “All Plus Share” permission  Desktop Sync (DS)
WebServices, GridServices and Firewalls Matthew J. Dovey Technical Manager Oxford e-Science Centre
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
Inconsistency of data User information not up to date Too many file version Wrong file name Not a fully mobility Require 3 rd party applications to.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Communications & Networks National 4 & 5 Computing Science.
Web 2.0 Applications. Tasks that can be completed with Dropbox.
FILE MANAGEMENT Computer Basics 1.3. FILE EXTENSIONS.txt.pdf.jpg.bmp.png.zip.wav.mp3.doc.docx.xls.xlsx.ppt.pptx.accdb.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Mobile Device Security Management Leyna Belinsky.
File Management in the Cloud
Jenny Pange University of Ioannina
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
GCSE ICT Revision Topic 2: Connectivity.
Store, Share, Sync and Collaborate
Chapter 3 Installing and Using Software
practice-questions.html If you Are Thinking about your dumps? Introduction:
Introduction to Soonr by ….
Cloud Storage Services
Encryption in Office 365 Shobhit Sahay Technical Product Manager
REDCap and Data Governance
Designing IIS Security (IIS – Internet Information Service)
IT Office hours – 1 Data Sharing 101
Comodo Dome Data Protection
Presentation transcript:

Data Encryption Data In Transit / Data At Rest

Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely – use the Cloud to transfer data and documents – make Dropbox safe and secure (if possible).

File Encryption At Rest may be: » Laptop or computer » Network Share » USB or removable storage » Cloud storage Recommend TrueCrypt as it can be used with all of these media types… including cloud storage! Recommend Dropbox as it handles encrypted files more efficiently; copying only the changed content of the encrypted file verses the entire encrypted file. Benefits – both are relatively easy to use & free Risks - lose the key/password and lose the data Concerns – collaboration is difficult resulting in reduced security

Encryption In Transit, communication can be secured by: » transport – use SSL to encrypt » application – use encrypted client » file encryption – send encrypted file Recommend SSL to secure communication transport Benefit – easy to setup and use. Webmail option is secure Risk – does not secure message from end-to-end or secure device Do not recommend using encrypted client Benefit – end-to-end encryption of message Risk – too complicated for average user and requires web of trust

Use file encryption to send encrypted message Benefit - if sending confidential information via is absolutely necessary this is a secure option Risk – requires sharing of password with recipient and lose control of access to data ****BEST METHOD –> DE-IDENTIFICATION**** If it is absolutely necessary to send research information through then de-identify the data first by removing any personally identifying information from the data set. Encryption (cont.)

Technical Demonstration File Encryption Truecrypt Documentation Beginners tutorial File Encryption - USB or portable setup Office workbooks-and-presentations-HA aspxhttp://office.microsoft.com/en-ca/help/password-protect-documents- workbooks-and-presentations-HA aspx Office workbook-or-presentation-with-passwords-permission-and-other-restrictions- HA aspxhttp://office.microsoft.com/en-ca/word-help/protect-your-document- workbook-or-presentation-with-passwords-permission-and-other-restrictions- HA aspx

Technical Demonstration (cont.) encryption McMaster Univmail – SSL transport settings Incoming Server: Server Name: univmail.cis.mcmaster.ca Protocol: IMAP Encryption Type: SSL Port: 993 Outgoing Server: Server Name: univmail.cis.mcmaster.ca Protocol: SMTP Encryption Type: SSL Port: 465 Outgoing server requires authentication. Univmail webmail - Encrypt file and send via – use Truecrypt or file password option in document

Technical Demonstration (cont.) Cloud Storage Dropbox basics - How to install Dropbox - Important Note: In order to access an encrypted file on Dropbox the Truecrypt software will need to be on the same system being used to access and to mount the encrypted file. Consider FileLocker - Paid service which offers cloud storage with – Collaboration – Secure file and folder syncing (end-to-end encryption) – Versioning – Notifications – Mobile accessibility

Questions?