PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.

Slides:



Advertisements
Similar presentations
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Advertisements

This presentation will take a look at to prevent your information from being discovered by and investigator.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
Module 6 Windows 2000 Professional 6.1 Installation 6.2 Administration/User Interface 6.3 User Accounts 6.4 Managing the File System 6.5 Services.
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 8 Operating Systems and Utility Programs By: James Granahan.
Pretty Good Privacy (PGP)
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Security SIG August 19, 2010 Justin C. Klein Keane
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Passwords, Encryption Forensic Tools
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Hands-On Microsoft Windows Server 2008
Electronic Mail Security
Tutorial 11 Installing, Updating, and Configuring Software
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Chapter 4 System Software.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 12.
PGP Encryption Justin Shelby. Encryption Methods  There are two basic key types for cryptography Symmetric Asymmetric.
Week #7 Objectives: Secure Windows 7 Desktop
Linux Networking and Security Chapter 8 Making Data Secure.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
10/1/2015 Chapter 2 Installing Windows XP Professional.
Electronic mail security. Outline Pretty good privacy S/MIME.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Software.
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Chapter 8: Operating Systems and Utility Programs Catherine Gifford Dan Falgares.
1. Chapter 25 Protecting and Preparing Documents.
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
Chapter 15: Electronic Mail Security
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Security PGP IT352 | Network Security |Najwa AlGhamdi 1.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Creating and Managing Digital Certificates Chapter Eleven.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Security SIG August 19, 2010 Justin C. Klein Keane
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Security  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
CloudBerry Explorer for S3. CB Explorer Free to use Browse and manage files PowerShell functions Open and edit files  CloudBerry Explorer is an easy.
Instructor: Syed Shuja Hussain Chapter 4: Operating System Basics.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
and File Security With GnuPG Matt Brodeur
HP Indigo Sales & Marketing Suitcase Overview and setup
ELECTRONIC MAIL SECURITY
An Installation Guide of PGP on Windows 2000
ELECTRONIC MAIL SECURITY
ONLINE SECURE DATA SERVICE
Presentation transcript:

PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner

What is PGP PGP (Pretty Good Privacy) is a data encryption and decryption program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, s, files, directories and whole disk partitions to increase the security.

Why PGP? Early 90’s mobile computers provided easier communication, but less protection of sensitive data Easy, quick, enforced security, and cheaper than encryption policies Also keeps instant messages confidential (only for certain IM providers[AIM])

Additional PGP notes PGP comes in many different forms Endpoint Files and Management Sold worldwide ◦ There are software development kits where you customize certain elements to your business security regulations ◦ PGP command line lets you encrypt, decrypt, sign, and verify files on a server as part of batch file process or backup procedure

PGP Desktop encoding PGP encryption techniques: 1.Hashing 2.Data compression 3.Symmetric-key cryptography, 4.Public-key cryptography

PGP Corporation PGP Desktop is an easy-to-use desktop encryption application that secures information. PGP Desktop uses PGP encryption technology that has been “proven effective by millions of users, security experts, and organizations worldwide”

PGP Desktop PGP Desktop Home encrypts s without installing special plug-ins. You can customize encryption rules, including rules to encrypt based on recipient, subject header, and message content. All s can be digitally signed, and validated by the recipients private or custom encrypted key.

PGP Desktop (Continued) PGP desktop can run on either MAC or PC. PGP’s desktop also offers an easy-to-use interface that appeals to both new and experienced users Will initially be covering the PGP Zip tool. Additional tools will be covered after the tutorial.

Additional Tools Offered(In this version ) PGP Netshare- PGP Netshare offers comprehensive filesharing management PGP Messaging automatically encrypts, decrypts, digitally sighns, and verifies messages according to user-set policies. PGP Whole Disk offers non-stop encryption for an entire desktop, laptop, and removable disk, including temporary files and OS swap files.

Additional Tools Offered(In this version) PGP Zip creates secure, encrypted archives that can contain single or multiple files, even entire directories using state of the art compression. PGP Virtual Disk Transparently creates encrypted disk images whose contents are encrypted when not in use, preventing unauthorized access.

Downloading PGP Desktop (Client) ial/desktoptrial2.html ial/desktoptrial2.html 1. Agree to terms to reach the download links 2. Select your OS (Mac or Windows) 3. Save the zipped file to some folder on your computer

Installation (Windows) 1. There will be a zip folder within a zip folder when you go to access the file you just downloaded. Unzip each folder until you reach the inner folder (it will be marked as the inner zipped folder). 2. Once the inner folder is unzipped, select the executable file that corresponds to your processor type (32 bit or 64 bit) 3. Keep selecting next & restart your PC when prompted.

Configuration 1. Input initial organizational information(Name, organization, etc) 2. Input a public key (Known to the public) 3. Input a Private Key (Known only to user)

Licensing Information Input

Public Key input

Private Key Input Demo: new key & checking the keys status

Actual File Encryption Demonstration

More Tutorial Clarification Section B #2 Section D Note: Searching for existing keys Encrypting for non PGP users

Sources: esktop_pro/ esktop_pro/ esktop_pro/ esktop_pro/ ial/desktoptrial2.html ial/desktoptrial2.html