© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective 108.02 Course Weight 2%

Slides:



Advertisements
Similar presentations
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

File Management Chapter 3
1 USING "ENCRYPTING FILE SYSTEM" TO PROTECT FILES AND FOLDERS IN "WINDOWS.."
This presentation will take a look at to prevent your information from being discovered by and investigator.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
1 File systems security: Shared folders & NTFS permissions, EFS (Week 6, Monday 2/12/2007) © Abdou Illia, Spring 2007.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Module 6: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Implementing Disk Quotas.
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
1 Chapter Overview Managing Data Storage Creating Dynamic Disks Implementing Storage Quotas Managing Compression and Encryption.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
TRUECRYPT.
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
Troubleshoot Access, Authentication, and User Account Control Issues Lesson 8.
Storage and NT File System INFO333 – Lecture Mariusz Nowostawski Noria Foukia.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 14 Windows XP Professional 1.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Securing Windows.
Week #7 Objectives: Secure Windows 7 Desktop
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Troubleshooting Windows Vista Security Chapter 4.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Disk Fragmentation 1. Contents What is Disk Fragmentation Solution For Disk Fragmentation Key features of NTFS Comparing Between NTFS and FAT 2.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Computer Disk management Using Disk Management To open Disk Management: Click Start, right-click My Computer, and then click Manage. Under the Storage.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Configuring Data Protection Chapter 12 powered by dj.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
Understanding Backup and Recovery Methods Lesson 8.
Module 5: Configuring and Managing File Systems. Overview Working with File Systems Managing Data Compression Securing Data by Using EFS.
Creating and Managing Digital Certificates Chapter Eleven.
Managing Applications, Services, Folders, and Libraries Lesson 4.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Microsoft Windows XP Professional MCSE Exam
Understand Encryption LESSON 2.5_A Security Fundamentals.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Module 11: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Configuring EFS Recovery Agents Implementing Disk Quotas.
Photo Recovery How to Get Back your Lost Photos Easily?
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
UNM Encryption Services in Development
Configuring Encryption and Advanced Auditing
Uses Of Encryption Algorithms
File System Management
Introducing NTFS Reliability Security Long file names Efficiency
Creating and Managing Folders
Presentation transcript:

© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%

© ExplorNet’s Centers for Quality Teaching and Learning 2 Security Through Encryption Encryption is the process through which the contents of files and folders are secured from unauthorized access.  Contents are scrambled using keys, certificates, and algorithms.  Can only be read by an authorized user who has the proper key.

© ExplorNet’s Centers for Quality Teaching and Learning 3 Encryption in Windows Encrypting File System (EFS)  A Windows file system feature that allows users to encrypt information on all types of physical media.  Available on all versions of Windows 7.  Fully supported in the Professional, Enterprise, and Ultimate versions.  Partially supported on Starter, Home.

© ExplorNet’s Centers for Quality Teaching and Learning 4 Encryption in Windows  Files are not encrypted by default.  When users choose to encrypt the file/folder appears green in Windows Explorer.

© ExplorNet’s Centers for Quality Teaching and Learning 5 How to Use EFS  A user chooses to secure a file/folder with EFS through the Properties dialog box.

© ExplorNet’s Centers for Quality Teaching and Learning 6 How to Use EFS  From the Advanced attributes a user can choose to encrypt.  If “file only” encryption is done a second prompt asking to encrypt the folder may appear.

© ExplorNet’s Centers for Quality Teaching and Learning 7 How EFS Works: Encryption 1.When you mark a file for encryption EFS creates an encryption key.  A key is a large, random number specific to that file/folder.  The encryption key is stored with the file. 2.EFS then uses the key and an algorithm to scramble the contents of the file.  To authorized users the file appears normal.  Unauthorized attempts to open the file result in an “Access Denied” message.

© ExplorNet’s Centers for Quality Teaching and Learning 8 How EFS Works: Encryption 3.To link the key to your user account each file/folder key is encrypted with a personal file encryption certificate called an EFS Certificate. 4.Your EFS Certificate is stored in the Windows Certificate database.

© ExplorNet’s Centers for Quality Teaching and Learning 9 How EFS Works: Decryption When you attempt to open an encrypted file this is approximately what happens. 1.The file signals the need to be decoded.  To decode the file the encryption key is needed.  The encryption is stored with the file, but….  Recall that the encryption key itself was encrypted 2.The OS calls for an EFS Certificate to decode the encryption key.

© ExplorNet’s Centers for Quality Teaching and Learning 10 How EFS Works: Decryption 3.Windows finds your EFS Certificate because you are logged in to your user account.  Because your EFS Certificate was used to encrypt the file’s encryption key it can also be used to correctly decode the encryption key. 4.The OS decodes the file’s encryption key using your EFS Certificate. 5.The OS uses the file’s encryption key to decode the file.

© ExplorNet’s Centers for Quality Teaching and Learning 11 EFS Tips  Loss or damage to an encryption key or EFS Certificate means loss of the file/folder.  Always have backups.  The Administrator account is the designated recovery agent if you ever lose access to a file.  Encrypting at the folder level is preferred.  New files added to the folder are automatically encrypted.  Less chance of accidental file security breach.  Encrypting adds processing time to file accesses and increases file size significantly.

© ExplorNet’s Centers for Quality Teaching and Learning 12 BitLocker Drive Encryption  Encryption feature in the Enterprise and Ultimate versions of Windows 7 that works with TPM to secure entire disks instead of files.  Trusted Platform Module (TPM)  A microchip on many motherboards that helps protect the computer from being accessed if stolen, lost, or attacked. It works most effectively when paired with another system, like an OS.

© ExplorNet’s Centers for Quality Teaching and Learning 13 BitLocker To Go  Usually BitLocker is used to encrypt hard disk drives.  BitLocker To Go allows the encryption of portable media.

© ExplorNet’s Centers for Quality Teaching and Learning 14 Compression The process of reducing the size of data without affecting the content.  Compression is used by any company with a sizeable amount of data.  Storage is expensive.  If the data is important there will be a backup copy.  Now you need twice as much storage.

© ExplorNet’s Centers for Quality Teaching and Learning 15 Compression  Files often consist of repetitive binary patterns.  Mathematicians use this fact to develop compression algorithms that replace the repetitive data with pointers.  Pointers take up much less space without compromising the data.

© ExplorNet’s Centers for Quality Teaching and Learning 16 How to Use Compression Choose

© ExplorNet’s Centers for Quality Teaching and Learning 17 Compression Tips  Compressed files appear blue in Explorer.  Compressed files cannot be encrypted.  If you want to encrypt, decompress first, then encrypt.  Different files have different compression ratios.  Large, contiguous files usually experience the most gain from compression.  Video is a good example, lots of repeated frames.