Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – email a document safely.

Slides:



Advertisements
Similar presentations
Click to edit Master title style Updates Aug updates – SMTPA authenticated server – alias addresses – Rapid Response Notification.
Advertisements

Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Impact of the Recent UC Denver Remote Computing Audit May, 2010.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Team Wolf Distributed, Consistent and Secure USB Storage Final Project Review Eddie Lai Matt Dube Sean Busch Zhou Zheng.
Secure Off Site Backup at CERN Katrine Aam Svendsen.
Princeton Collaborative Research Resources Feb. 18, 2011 Todd Hines Linda Oppenheim.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
1 Integrating ISA Server and Exchange Server. 2 How works.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Penn State University College Of Education Understanding College of Education Resources.
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
New Data Regulation Law 201 CMR TJX Video.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
Backup Local Online For secure offsite storage of your , and making it available from any computer or smart phone. Backup accessed with.
Using Mail Mac OS X. Opening Mail First of all, click on this icon in the dock (or in your Applications folder) to bring up Mail.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
April 2014 LCCU Meeting We’ll answers members’ questions: –Choices for Backing Up to the Cloud – Idrive, OneDrive, Google Drive, Dropbox, Spideroak … –How.
Internet-Based Client Access
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
IS 247 Introduction to Web Application Development Tim Wu.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Masud Hasan Secue VS Hushmail Project 2.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Securing Microsoft® Exchange Server 2010
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Storage Issues 09/05. ownCloud Open source software ◦ php + javascript Main Features: ◦ Access Data ◦ Sync Data ◦ Share Data.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Types of Electronic Infection
POP3
New Features v1.4. CPO New Features  Send File Link Improvements  Send File Link via mobile phone  “All Plus Share” permission  Desktop Sync (DS)
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Unified Distributed (UDub Mail) Life Cycle Objectives Sachin Pradhan Gabriel Maganis.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
1 Copyright © 2015 Pexus LLC Network shares and media shares from your Patriot PS Personal.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Communications & Networks National 4 & 5 Computing Science.
Web 2.0 Applications. Tasks that can be completed with Dropbox.
(Electronic Mail) a message sent and received electronically via telecommunication links between computers.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
@Connect – Students' Lifetime Student can keep account after completed their study in HKUST Domain part.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
How to Use an Android Tablet Well Come To You few Steps For How to Use an Android Tablet?
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Network Programming 10- SMTP-POP3
ITwin iTwin Presented by: G.Vyshnavi 14A81A0572 CSE-B.
File Management in the Cloud
Internet Business Associate v2.0
Jenny Pange University of Ioannina
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
GCSE ICT Revision Topic 2: Connectivity.
Store, Share, Sync and Collaborate
Fix Thunderbird Error 5.7.1 Call Toll-free
Introduction to Soonr by ….
Cloud Storage Services
Encryption in Office 365 Shobhit Sahay Technical Product Manager
An Introduction to Cloud Computing
REDCap and Data Governance
On the off chance that your business utilizes Roadrunner as your Internet specialist organization, you will have at least one accounts. While you.
IT Office hours – 1 Data Sharing 101
MESSAGE ACCESS AGENT: POP AND IMAP
Comodo Dome Data Protection
Presentation transcript:

Data Encryption Data In Transit / Data At Rest

Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely – use the Cloud to transfer data and documents – make Dropbox safe and secure (if possible).

File Encryption At Rest may be: » Laptop or computer » Network Share » USB or removable storage » Cloud storage Recommend AESCrypt - and while not quite a feature rich as TrueCrypt was it is really easy to use for single files. Recommend AxCrypt - as it can be used with all of these media types… including cloud storage! Recommend Dropbox as it handles encrypted files more efficiently; copying only the changed content of the encrypted file verses the entire encrypted file. Benefits – both are relatively easy to use & free Risks - lose the key/password and lose the data Concerns – collaboration is difficult resulting in reduced security

Encryption In Transit, communication can be secured by: » transport – use SSL to encrypt » application – use encrypted client » file encryption – send encrypted file Recommend SSL to secure communication transport Benefit – easy to setup and use. Webmail option is secure Risk – does not secure message from end-to-end or secure device Do not recommend using encrypted client Benefit – end-to-end encryption of message Risk – too complicated for average user and requires web of trust

Use file encryption to send encrypted message Benefit - if sending confidential information via is absolutely necessary this is a secure option Risk – requires sharing of password with recipient and lose control of access to data ****BEST METHOD –> DE-IDENTIFICATION**** If it is absolutely necessary to send research information through then de-identify the data first by removing any personally identifying information from the data set. Encryption (cont.)

Technical Demonstration File Encryption AESCrypt Documentation - AxCrypt Tips - AxCrypt Documentation Office documents-workbooks-and-presentations-HA aspxhttp://office.microsoft.com/en-ca/help/password-protect- documents-workbooks-and-presentations-HA aspx Office document-workbook-or-presentation-with-passwords-permission-and- other-restrictions-HA aspxhttp://office.microsoft.com/en-ca/word-help/protect-your- document-workbook-or-presentation-with-passwords-permission-and- other-restrictions-HA aspx

Technical Demonstration (cont.) encryption McMaster Univmail – SSL transport settings Incoming Server: Server Name: univmail.cis.mcmaster.ca Protocol: IMAP Encryption Type: SSL Port: 993 Outgoing Server: Server Name: univmail.cis.mcmaster.ca Protocol: SMTP Encryption Type: SSL Port: 465 Outgoing server requires authentication. Univmail webmail - Encrypt file and send via – use encryption software or file password option in document

Technical Demonstration (cont.) Cloud Storage Dropbox basics - How to install Dropbox - Important Note: In order to access an encrypted file on Dropbox the encryption software will need to be on the same system being used to access and to mount the encrypted file. Consider FileLocker - Paid service which offers cloud storage with – Collaboration – Secure file and folder syncing (end-to-end encryption) – Versioning – Notifications – Mobile accessibility

Questions?