Mobile Device Encryption

Slides:



Advertisements
Similar presentations
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Advertisements

Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Mobility for the Enterprise
System Software, functions of an operating system
File sharing. Connect the two win 7 systems with LAN card Open the network.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Virtual techdays Desktop Security with Windows 7 AppLocker & BitLocker to Go Aviraj Ajgekar│ Technology Evangelist │Microsoft Corporation Blog:
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
© Paradigm Publishing Inc. 4-1 Chapter 4 System Software.
Windows 8 Starter Guide and Educational Apps Rica Young If you have a question during the webinar, please type it in the chat window, preface it with ???,
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Chapter 4 System Software.
Week #7 Objectives: Secure Windows 7 Desktop
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
Windows 7 for Information Workers NetCom SME: Neil Masih.
Troubleshooting Windows Vista Security Chapter 4.
Step By Step Windows Server 2003 Installation Guide Step By Step Windows Server 2003 Installation Guide.
OCR GCSE Computing © Hodder Education 2013 Slide 1 OCR GCSE Computing Chapter 2: Memory.
© Paradigm Publishing Inc. 4-1 OPERATING SYSTEMS.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
(ITI310) By Eng. BASSEM ALSAID SESSION 2: Server Configuration & Administration Notes SAT 31-Oct-2015.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Understand Encryption LESSON 2.5_A Security Fundamentals.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Windows for the Enterprise Boris Ulík Technology Solutions Professional Microsoft Slovakia.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Windows Vista Configuration MCTS : Maintenance and Optimization.
Working with Windows 7 at CERN
UNM Encryption Services in Development
Configuring Encryption and Advanced Auditing
Chapter Objectives In this chapter, you will learn:
DDC 1013 – Micro Computer Application
Trusted Computing and the Trusted Platform Module
Memory Key Revision Points.
Operating System.
(Presented by Eric Nobel)
Chapter 1 Getting Started
Desktop Virtualization
Trusted Computing and the Trusted Platform Module
Introduction to Computers
Rights Management Services (RMS)
Chapter 2/Module 2: Computer and managing files
Lesson 9 Windows Management
Chapter 3: Windows7 Part 3.
System & Network Administration (MCSA & RHCSA)
Using TrueCrypt 6th May 2009.
Bethesda Cybersecurity Club
Windows Virtual PC / Hyper-V
Keno Kozie Associates -
Lecture9: Embedded Network Operating System: cisco IOS
TPM, UEFI, Trusted Boot, Secure Boot
Instructor Materials Chapter 5: Windows Installation
“Encryption threatens to lead all of us to a very dark place.”
Lecture9: Embedded Network Operating System: cisco IOS
What is an operating system An operating system is the most important software that runs on a computer. It manages the computer's memory and processes,
Bethesda Cybersecurity Club
Presentation transcript:

Mobile Device Encryption Chris Edwards IT Services

Mobile Device Encryption Policy “All confidential data must be encrypted where stored on a mobile device”

What do we mean by “encrypted” ??

Password Protected Encrypted Trivially bypassed Protects data if lost / stolen

Can we avoid encrypting ? Could maybe: avoid storing confidential data on the laptop work completely “across the network” But often convenient to store locally anyway Also: data cached on device temporary folders In practice, virtually all laptops contain confidential data.

What type of encryption tool ? Folder encryption – save confidential data in a special encrypted folder need to remember to do this one day will forget and this still doesn’t encrypt: data cached on device temporary folders Full disk encryption (FDE) encrypts everything hence much safer!

Full Disk Encryption Encrypts everything Fast Transparent Native on common OS platforms Can be enabled without reinstall

Full Disk Encryption Windows BitLocker macOS FileVault Linux LUKS

Standard Staff Desktop (SSD) BitLocker default-on in SSD (enabled at build time)

Other Laptops Needs to be organised in your : College School Research Institute University Service

Other Laptops Users should be asked to bring University-owned laptops to their Local IT Support so that Full Fisk Encryption can be configured

Recovery Keys Data stored on laptops should exist elsewhere Hard drive could suffer physical failure ! Might forget the encryption password Prudent to keep a recovery key - somewhere safe BitLocker also requires key for certain hardware changes For SSD, ITS holds recovery keys in campus AD For non-SSD, local IT teams will want to organise their own repository Keep recovery keys as part of School IT asset register AD Create a school “recovery agent” certificate

How to… Detailed guides with pictures at: www.gla.ac.uk/confidentialdata Click on: “Laptops” “Memory sticks”

How to… Guides accessible enough for most reasonably tech savy users. However, where possible we recommend IT support staff should do the encrypting. Precise arrangements need to be determined in your School or College. IT Services happy to advise.

Consumer Grade Laptops May not have TPM chip Workaround to enable BitLocker boot time password memory stick (unsafe??) May come with a “Home” edition of Windows no BitLocker! may be unsuitable for storing confidential data

Personal Laptops University cannot mandate FDE for personally-owned laptops However, requirement to encrypt confidential data stored on a mobile device still applies!! Must encrypt it be some means FDE might be the easiest (MS “Device Encryption”?) Excellent Plan - use a terminal server (or equivalent) to completely avoid storing the data on the laptop in the first place: SSDremote Remote Desktop Session (e.g RDP)

Smartphones / Tablets Essential to set a PIN, or equivalent protection Fingerprint check Swipe pattern Many devices come with encryption in some cases this is default-on and the PIN is used to unlock the encryption

Memory Sticks Must be encrypted if confidential data is stored guides with pictures at: www.gla.ac.uk/confidentialdata In many cases easier to not store confidential data on sticks use the network instead