Using secure methods for sending and receiving files SPEEDE Server SPEEDE Users’ Group May 4, 2007 David Stallcup.

Slides:



Advertisements
Similar presentations
PlanetLab What is PlanetLab? A group of computers available as a testbed for computer networking and distributed systems research.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
Pretty Good Privacy – How to do it. Tony Brett IT Systems Manager Corpus Christi College OxCERT Tel. (2)76695 OUCS ITSS lunchtime.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
Security SIG August 19, 2010 Justin C. Klein Keane
February 2006Colby College ITS Using FTP. February 2006Colby College ITS Topics FTP Options at Colby For Mac Users For Windows Users.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Trusted Key Server OpenPKSD TKS Hironobu SUZUKI IWFST 2005 International Workshop on Future Software Technology.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
User Authentication By Eric Sita. Message Security Privacy: To expect confidentiality from a sender. Authentication: To be sure of someone's identity.
Andreas Steffen, , 11-SSH.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen M. Liebi Institute for Internet Technologies and Applications.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
We will now practice the following concepts: - The use of known_hosts files - SSH connection with password authentication - RSA version 2 protocol key.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
The Online Activity Module User Account and Contact Us June 5, 2013.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
REMOTE LOGIN. TEAM MEMBERS AMULYA GURURAJ 1MS07IS006 AMULYA GURURAJ 1MS07IS006 BHARGAVI C.S 1MS07IS013 BHARGAVI C.S 1MS07IS013 MEGHANA N. 1MS07IS050 MEGHANA.
Distribution Development Security Jeremiah Yongue.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
The solarmuri web-data server: Contains general information about our project Allows us to easily exchange data, images,
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Team 6 Decrypting Encryption Jeffrey Vordick, Charles Sheefel, and Shyam Rasaily.
File Transfer Protocol (FTP) FTP host stores files Client logs into host Client program sends command to get a file FTP host downloads the file with error.
Security SIG August 19, 2010 Justin C. Klein Keane
FileZilla Introduction to Web Programming Kirkwood Community College Fred McClurg © Copyright 2015, Fred McClurg, All Rights Reserved.
Public / Private Key Example Dan Fleck CS 469: Security Engineering Coming up: Today 11.
FileZilla An open-source success story. Mark Swelstad – Itec400, Winter 2007.
Steps for Symantec PGP Standalone install with Please use the following steps and screenshots to step your way through a standalone install of PGP.
PGP Key Management Basic Principals AfNOG 2007 April 26, 2007 Abuja, Nigeria Hervey Allen.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
KERBEROS SYSTEM Kumar Madugula.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
MERCEDES BENZ BRAZIL IBM GetThere TECTIA PGP Symantec Sending Files to the Mercedes GetThere and IBM CONEXION SFTP Legend: IBM Files (Files to send to.
Chapter 7 - Secure Socket Layer (SSL)
Internet Business Associate v2.0
SECURE SHELL MONIKA GUPTA COT 4810.
FTP - File Transfer Protocol
CIW Lesson 7 Part A Name: _______________________________________
An Introduction to Cloud Computing
Install AD Certificate Services
Unit 8 Network Security.
IMovie sits at the center of the iLife suite, integrating iTunes, iPhoto, and iDVD to help create professional-looking films with music, titles, and effects. 
Presentation transcript:

Using secure methods for sending and receiving files SPEEDE Server SPEEDE Users’ Group May 4, 2007 David Stallcup

Two Major Options Encryption –Pretty Good Privacy (PGP) –VeriCrypt, FileCrypt, Gnu Privacy Guard Secure file transfer –SSH2 protocol (includes SCP, SFTP, FTPS, and Active FTPS) Either option is available for UNIX, Mac, or Windows

Steps to Using PGP with the SPEEDE Server Obtain and install a copy of the PGP software Use PGP to generate a public and private key pair Exchange public keys with the Server Encrypt your outgoing files with the Server’s public key When you receive an encrypted file, decrypt it with your private key before processing

Help with Using PGP You must use RSA keys

Our Sincere Apologies On Tuesday, April 10, we upgraded our sending SPEEDE server. Soon, we discovered that not everyone could decrypt what we were sending from this new server. So on Wednesday, April 18, we switched back to the previous sending server (and resent all data to those schools experiencing the problem). We are currently testing to solve the problem.

Obtain and install SSH2 software suite your IP address, along with a userID and password, to the server Server will set up public key authentication on your sftp server, for sending via sftp* to you *this includes scp and pure sftp – ftps (passive) and active ftps both use userid and password Steps to Using SSH with the SPEEDE Server ** Receiving **

Steps to Using SSH with the SPEEDE Server ** Sending ** Notify the server that you wish to send via sftp You may upload a public key to the Server to avoid having to use password Otherwise, you will use a userID and password when sending files

Help with Using SSH

Texas Schools not yet using encryption - after one year (accounts have been disabled) 22/ Galveston College 22/ Weatherford College 22/ Baylor College of Dentistry 22/ Dallas Baptist University