Everything You Wanted to Know About Encryption in Just 10 Minutes

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Secure Transit & Storage HOW TO SECURELY STORE & SEND CONFIDENTIAL DATA by The UTHSC Information Security Team.
Confidentiality and Privacy Controls
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Columbus Convention Center - October 1, 2008 Meeting Room E171 James Matheke Greg Perkins.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Types of Electronic Infection
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Virtual Private Network (VPN)
By: Rathi Raja Section 1055, 005 About Internet Privacy  Should we have Internet Privacy? Why do we need it? Can having internet privacy help us and.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Guest Wireless Service Overview Andrew Rader November, 2013.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
17- 1 Last time ● Internet Application Security and Privacy ● Link-layer security: WEP, WPA, WPA2 ● Network-layer security: VPN, IPSec.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
VCE IT Theory Slideshows
Decluttering Your Digital Life
Virtual Private Networks
Key words: Secure | Password | Character
Internet Business Associate v2.0
Proposed Information Security Policy Changes
SSL Certificates for Secure Websites
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Presented by, K.K.Radhika.
Chapter 5 Electronic Commerce | Security
Topic 1: Data, information, knowledge and processing
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Year 10 ICT ECDL/ICDL IT Security.
practice-questions.html If you Are Thinking about your dumps? Introduction:
Business Communication Dr. Aravind Banakar –
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Education – Partnership – Solutions
BP5 – encryption - Fun gym
Encryption The Good kind of obscurity
COMPUTER PRIVACY.
Fix All Your Issues at Trezor Support Phone Number
M3: Encryption r By Andrew Stringer.
Public Key Cryptography
Digital Signatures and Forms
Chapter 5 Electronic Commerce | Security
Confidentiality and Privacy Controls
Big Data & Privacy Review - summary.
Engaging families. Creating communities.
Digital $$ Quiz Test your knowledge.
VPN What, where, who, why when?.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
BP5 – encryption - Fun gym
21st Century Learning Spaces
Lecture 4 - Cryptography
Chapter 3: Protecting Your Data and Privacy
Making Your Web Presence User-Friendly
Secure Electronic Transactions (SET)
Public-Key, Digital Signatures, Management, Security
Security of People, Property and Information
Unit 8 Network Security.
Electronic Payment Security Technologies
Communicating in the IT Industry
WJEC GCSE Computer Science
Virtual Private Networks (VPN)
Presentation transcript:

Everything You Wanted to Know About Encryption in Just 10 Minutes Education – Partnership – Solutions OBF All-Staff Meeting May 24, 2016 Everything You Wanted to Know About Encryption in Just 10 Minutes Information Security Office infosecurity@utdallas.edu

Data has value, therefore someone wants to steal it. Education – Partnership – Solutions Data has value, therefore someone wants to steal it.

Education – Partnership – Solutions Why Be Concerned?

Education – Partnership – Solutions Why Be Concerned?

Education – Partnership – Solutions Why Be Concerned?

Education – Partnership – Solutions Encryption makes it possible to achieve privacy using communication and storage methods that were not designed for privacy.

Encryption is another word for math. Education – Partnership – Solutions Encryption is another word for math.

So let’s have a quick math lesson. Education – Partnership – Solutions So let’s have a quick math lesson.

Math Can Be Reversed Addition is reversed by subtraction Education – Partnership – Solutions Math Can Be Reversed Addition is reversed by subtraction Multiplication is reversed by division 12 x 8 = 96 96 / 12 = 8

Let’s Encrypt “8” and Send It Education – Partnership – Solutions Let’s Encrypt “8” and Send It 12 x 8 = 96 12 is the encryption key we agreed on x is the algorithm 8 is the data that I need to send you 96 is the encrypted message

Let’s Receive “96” and Decrypt It Education – Partnership – Solutions Let’s Receive “96” and Decrypt It 96 / 12 = 8 96 is the encrypted message / is the algorithm that reverses x 12 is the encryption key we agreed on 8 is the decrypted message

Encryption Over the Years Education – Partnership – Solutions Encryption Over the Years

Keys Are Getting Longer Education – Partnership – Solutions Keys Are Getting Longer

Virtual Private Network (VPN) Education – Partnership – Solutions Virtual Private Network (VPN) Remote access allows you to work from anywhere in the world by encrypting data while transmitted over the Internet.

Virtual Private Network (VPN) Education – Partnership – Solutions Education – Partnership – Solutions Virtual Private Network (VPN)

Education – Partnership – Solutions Hard Drive Encryption can protect all of the contents in the event that it is lost or stolen.

Education – Partnership – Solutions Hard Drive

Education – Partnership – Solutions Hard Drive

Education – Partnership – Solutions Hard Drive

Education – Partnership – Solutions Web Browsing Websites that use https:// rather than http://, look for the “s” when doing banking or financial transactions.

Education – Partnership – Solutions Web Browsing Websites that use https:// rather than http://, look for the “s” when doing banking or financial transactions.

Education – Partnership – Solutions Email Encryption is like sending a letter in an envelope, instead of sending a postcard that anyone can read while handling it.

Education – Partnership – Solutions Email

Email Off Campus sue@gmail.com ben@utdallas.edu Education – Partnership – Solutions Email Off Campus sue@gmail.com ben@utdallas.edu

to include [encrypt] trigger in subject line Education – Partnership – Solutions Email Off Campus sue@gmail.com ben@utdallas.edu  Situation Confidential Data Controlled Data Public Data Emailing anyone that does not have a @utdallas.edu email account, such as business partners, colleagues at other universities, incoming students, etc. Required to include [encrypt] trigger in subject line Recommended Email encryption not required

UTD Campus Email sue@utdallas.edu ben@utdallas.edu Education – Partnership – Solutions UTD Campus Email sue@utdallas.edu ben@utdallas.edu

UTD Campus Email sue@utdallas.edu ben@utdallas.edu Situation Education – Partnership – Solutions UTD Campus Email sue@utdallas.edu ben@utdallas.edu  Situation Confidential Data Controlled Data Public Data Two or more UT Dallas users all communicating with @utdallas.edu email accounts Email encryption not required

Education – Partnership – Solutions askYoda infosecurity@utdallas.edu https://www.utdallas.edu/infosecurity https://www.facebook.com/UTDInfoSec