Filelocker: Simplifying Secure File Transfers

Slides:



Advertisements
Similar presentations
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Advertisements

Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
Cut Costs and Increase Productivity in your IT Organization with Effective Computer and Network Monitoring. Copyright © T3 Software Builders, Inc 2004.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
A Web-based Bibliography Management Initiative: Collaborating for Classroom and Library Technology Integration Brian Nielsen, Academic Technologies Denise.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Webdisk Storage Anywhere, Anytime for Everyone Presented at Educause, 2003 Copyright 2003, Jeremy Mortis and Harold Esche. This work is the intellectual.
Unraveling Web Development PRESENTERS: Bob Nakles and Paras Kaul, George Mason University.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Moving Your Paperwork Online Western Washington University E-Sign Web Forms Copyright Western Washington University, This work is the intellectual.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Copyright Tim Antonowicz, This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Information Security Office 1 Copyright Statement Copyright Mary Ann Blair This work is the intellectual property of the author.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Baylor University and Xythos EduCause Southwest 2007 Dr. Sandra Bennett Program Manager Online Teaching and Learning System Copyright Sandra Bennett 2007.
1 No More Paper, No More Stamps: Targeted myWSU Communications Lavon R. Frazier April 27, 2005 Copyright Lavon R. Frazier, This work is the intellectual.
Please Note: Copyright –David L. Snellman This work is the intellectual property of the author. Permission is granted for this material to be shared.
Chapter 8 The Internet: A Resource for All of Us.
Identity on Force.com & Benefits of SSO Nick Simha.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Simplify TeleHealth - Copyright 2012 Emerge.MD inc - Confidential Single Sign On via Active Directory Federation Services 4.6 Release (March 2014) Updates.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
©Stephen Kingham SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005 By Stephen Kingham
Poster Print Size: This poster template is 50” high by 30” wide and is printed at 120% for a 60” high by 36” wide poster. It can be used to print any poster.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
ICE Integrated Cloud Environment Cloud Scanning and Mobile Printing
Copyright Joel Rosenblatt 2010
Web Applications Security Cryptography 1
Nithyamoorthy S Core Mind Technologies
SIP Protocol overview SIP Workshop APAN Taipei Taiwan 23rd Aug 2005
3 Drexel X Google X Microsoft
CT1503 Network Operating System
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
10/09/2018 The eFolio Arrives John Sewell.
Portal Rethinking the Modern-Day Campus
John O’Keefe Director of Academic Technology & Network Services
Outline What does the OS protect? Authentication for operating systems
Server Concepts Dr. Charles W. Kann.
Federated Identity to Support Collaboration in the CIC
What Is Tapestry? An Online learning journal system.
Outline What does the OS protect? Authentication for operating systems
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Global Management System
Copyright Notice Copyright Bob Bailey This work is the intellectual property of the author. Permission is granted for this material to be shared.
COM Orientation The template can be used to create presentations for community, civic, advocacy and government relations groups. It is also appropriate.
Chapter 27: System Security
An Introduction to Computer Networking
Blaine A. Brownell, President,
Privilege Management: the Big Picture
Project for OnLine Instructional Support (POLIS)
Part 3.
myIS.neu.edu – presentation screen shots accompany:
Signet Privilege Management
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
Technical Topics in Privilege Management
Unit# 5: Internet and Worldwide Web
Faculty of Science IT Department By Raz Dara MA.
Data Security Awareness
LO3 – Understand Business IT Systems
Enabling Applications to Use Your IdMS
Designing IIS Security (IIS – Internet Information Service)
COMPLETE BUSINESS TEXTING SOLUTION
Signet Privilege Management
IT Office hours – 1 Data Sharing 101
Week 7 - Wednesday CS363.
Bad News Messages: How Much and How Often?
Message Passing Systems
Hazelwood Schools Wednesday 2nd October 2019.
Presentation transcript:

Filelocker: Simplifying Secure File Transfers Presented by: Brett Davis, IT Security Engineer Copyright William Brett Davis, 2010. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Agenda Initial needs Filelocker v1 (currently in production) Lessons learned and feedback Filelocker v2 (going to beta soon) Future Action Items/Plans for v2.5 Questions

How do you send sensitive information? Currently… How do you send sensitive information? PGP? S/MIME? Encrypted Zip? Out of band password transmission? Sneaker-net? How about larger files???

Project Initiating Problems Faculty and staff would unknowingly use regular email to send sensitive data to others Implementing email security campus wide is expensive or complex (but usually both) Security personnel needed a secure means to communicate back and forth and with end users E-mail is inefficient for sending large files - especially to multiple users People unknowingly sending infected files Lack of ability to (easily) authenticate senders of files via email Auditing

Sensitive data would hang around on the network for much too long. and zombies Sensitive data would hang around on the network for much too long. We still the effects of this today when someone plugs in an old workstation or server Oh what secrets the undead have to tell

Filelocker v1 Enter Filelocker v1 -Developed in house (WHICH MEANS IT’S FREE RIGHT?) -Designed around securing the transfer (security in transit, at rest, secure deletion, separation of keys from files, minimized need for pre-shared keys) -Attempted to be intuitive so that users would be less resistant to adoption and would opt to use it over email -Designed to be efficient for larger files (<1GB) – upload once, download many -Tied into Purdue’s directory -Allowed for (relatively) secure sharing out to the public -Kept history of uploads and downloads (though not easily user accessible)

Uploads in Action! Drawback:Did not allow virus scans and encryption!

Sharing and Searching

It’s nice but… Feedback Needs a way to let people outside Purdue upload Needs groups Needs bigger files Mandatory encryption Can it be used to distribute AV and other security related software? Can students use it? If so, can’t they use it to share music!?! OH NO!!!!

So Filelocker v2 now has Groups Larger file upload capacity (arbitrarily large now, max can be set in config) Upload requests (allows people outside Purdue to upload to Filelocker) Mandatory encryption A provision to check file md5 hashes against known copyrighted material – just need to find a database Ability to scan encrypted files Among other core and UI upgrades (better OOP, more intuitive interface) -The alternative to hashes would be disallowing .mp3 extensions or possibly just disallowing them for students.

Filelocker V2 UI mock ups Some of you might find this layout… familiar

Upload options

Uploads in progress

Sharing with other users

Public uploads

Public Sharing

Core is written in Python (CherryPy for the web server) MySQL database Technologies used Core is written in Python (CherryPy for the web server) MySQL database jQuery and some other JQ plugins (all open source) on the front end to manage concurrent uploads

Security Specifics SSL used to encrypt files in transit Files are spooled to disk Virus Scan MD5 calculation and lookup Encrypted using AES-128 Temp file is securely deleted Auto-encrypted files store keys in database (which should be on a different server than the file server) Files are not at risk if only the file server or only the db server is compromised Files and users have a max lifetime – purged after x days

In the works for 2.5 SMB server support (users can link FL to an SMB share – serve files directly from it) Caveat: No file encryption and credentials for share must be stored by FL! Secure Messaging (Think Facebook style messages) Mobile (iPhone, Blackberry) apps Login federation and ability to “connect” Filelocker instances at different organizations Desktop application to emulate network drive (maybe…)

Can anyone see something like this being adopted at your institution?

Beta testing to start mid-May Where we are now Beta testing to start mid-May If anyone is interested in testing at their own site – please send me an email at wbdavis@purdue.edu The core of Filelocker will be open sourced soon (since I know you were going to ask)

Suggestions? Questions? Have any of you approached secure file sharing in a different way?