Encryption The Good kind of obscurity

Slides:



Advertisements
Similar presentations
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Advertisements

McAfee Files & Folder Encryption As observed at WFO GLD All USB Devices will be encrypted. (Unless a waiver has been approved or lager than 64g.) Use of.
Are You Smarter Than a 5 th Grader? 1,000,000 Blog Online Search Kindle? Documents? Backup Virus click here! Downloading Music Expiration Date?
Secure Transit & Storage HOW TO SECURELY STORE & SEND CONFIDENTIAL DATA by The UTHSC Information Security Team.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
V | © OverDrive, Inc | Page 1 User Experience: Library eBooks for Kindle.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
ESCCO Data Security Training David Dixon September 2014.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
University Health Care Computer Systems Fellows, Residents, & Interns.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
Specialist communication channel. Sarah-Jane king.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
By Liam Wright Manga comic group Japan SAFETY on your computer.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Knut S-C Öjermark K enmark International Pleasanton Senior Center.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Computer Security Sample security policy Dr Alexei Vernitski.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Paging & Messaging at VCU Health. VCU Health Communications Center AKA “Telepage” Multiple Services, Multiple Call Centers Paging (Telepage) Patient Information.
IT Workshop Presented by CoM IT Thursday, November 20th 3:30 – 5:00 PM MSB ROOM 4051 Speakers: Jesse Fatherree, Wade Hedgren, Kent Norton We will be covering.
Dial-In Number: (562) Webinar ID: Encrypt It Huh? What are you talking about? Dial-In Number: Webinar ID:
Protecting PHI & PII 12/30/2017 6:45 AM
Internet Safety How to stay safe online.
DATA SECURITY FOR MEDICAL RESEARCH
TurningPoint ResponseWare
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Before the talk… Zix Mail is the approved encrypted platform, we will have training on this soon. Citrix Sharefile has been approved for use for.
How to use the internet safely and How to protect my personal data?
Protecting Interprocess Communications
46elks Add-In for Microsoft Office 365 Excel Makes it Easy to Add SMS and Voice to Any Website or App – Just Install, Select Numbers, and Hit Send OFFICE.
Working with Google Applications Gmail, a popular
Everything You Wanted to Know About Encryption in Just 10 Minutes
Patient access Forgotten password
Phone Safety Quiz.
Information Security 101 Richard Davis, Rob Laltrello.
Topic 1: Data, information, knowledge and processing
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Unit 4 IT Security.
Staying Austin College
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Trezor Support Phone Number For You!! Round The Clock
Fix All Your Issues at Trezor Support Phone Number
Uses Of Encryption Algorithms
Martus Account Set Up Benetech is a non-profit organization that develops and supports Martus, a secure information management software for human rights.
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
How to keep the bad guys out and your data safe
ONLINE SECURE DATA SERVICE
IST346: Operating Systems / Command Line Interfaces
Security of People, Property and Information
Communicating in the IT Industry
Handling Information Securely
IT Office hours – 1 Data Sharing 101
Getting Started With LastPass Enterprise
Presentation transcript:

Encryption The Good kind of obscurity Brad Saxton, Senior System Administrator, ITS

What Is Encryption? In short, it is changing information into another format that makes it impossible (or really, really, really, really hard) to read unless you know/have something In other words, it is a way of ensuring that the information is only readable by the intended recipient. Think about "secret messages" that spies send to each other The math behind it is really complicated but you don't need to know any of that. Suffice it to say that using good encryption makes it virtually impossible in a finite amount of time to decrypt the information

Why do we need it? More and more critical information is being sent around and might get inadvertently exposed to less than ethical people Personal information Passwords Credit cards Pictures Losing these can be at a minimum embarrassing and potentially costly Confidential Information at Work Student information HR information Losing these can be potentially damaging to Brock and very costly in terms of money and reputation

Where Can/Should It Used? Mobile Devices (ie. Tablets, phones, laptops and USB keys) Encrypting your storage makes it "impossible" to access in the event your device is lost or stolen Web sites Always check that the "lock" icon is there when doing anything private Email Encrypted documents make it impossible for others to read in the event the email is sent to the wrong people

Availability Most modern operating systems allow for the encryption of the entire storage including USB sticks and external drives MAC OSX (File Vault) Windows (BitLocker) Apple IOS (ie. IPhone) Enabled by default if you use a passcode/password (you have one right?) Android On by default for Android 6.0 (Marshmallow) if you use a passcode/password (and who wouldn't) Available in Android 2.3 (Gingerbread) through 5.0 (Lollipop) Word Processors/Spreadsheets All can encrypt a file with a password

Sending Files Via Email Email is by definition "not secure" since it is not guaranteed to be encrypted and it is going through multiple servers The email could be intercepted You could send it to the wrong person(s) Having completely encrypted email is possible but far too awkward for most users When sending confidential information to a colleague or outside person via email, it is important to make sure that the information can't be read by anyone but the intended recipient By encrypting the file before sending, even if the file "goes wandering", the password is still required to open the file Never send the password the same way that you send the file. For example, call the person, text them, "snail mail" it, have an agreed upon password

Checking a website for encryption Demonstration Checking a website for encryption

Demonstration Encrypting a word/excel document

Demonstration How to encrypt a file for USB, email or file transfer

Questions? See brocku.ca/information-technology/security for complete details There are no "stupid questions"….. ….............only "stupid Answers"