Encryption Jack Roberts, PPD, RAL, STFC. Why? Government reaction to high profile data losses. STFC General Notices 30 th January, 1 st February 2008.

Slides:



Advertisements
Similar presentations
Mobile Encryption Group Discussion and Written Project – CDI East 2006 Rick Smith Rick Wanner
Advertisements

Wireless Connectivity at Pace University Wireless Connectivity is: Available at every Pace location Note: In NY 55 John St. & St. George have wireless.
Erick Engelke Director, Engineering Computing January 10, 2010
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark.
PC Encryption installation progress/password screen Includes comments from: Encryption team Sarah Deane Tony Stieber Selected people who took part in the.
Installing Windows XP Professional Using Attended Installation Slide 1 of 30Session 8 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
General Operation and Facts As of 3/24/2014. Virtual Desktop 1. What is a Virtual Desktop? 2. Why VDI? 3. Installing the Virtual Desktop 4. Accessing.
How to access AUXDATA March If you have not received a Username from your DSO-IS, do not go any further. Send a request to your FSO-IS/SO-IS asking.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
1 Web Server Administration Chapter 3 Installing the Server.
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 Technology Readiness Maryland /2015 Admin Schedule 2 AssessmentOnline/CBT Testing Dates PARCC - PBAMarch 2 – May 8 MSA ScienceApril 13.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Fermilab VPN Service What is a VPN ?.
10 Essential Security Measures PA Turnpike Commission.
Engineering H192 - Computer Programming The Ohio State University Gateway Engineering Education Coalition Lect 4P. 1Winter Quarter Introduction to UNIX.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Ch 11 Managing System Reliability and Availability 1.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Chapter 7: Using Windows Servers to Share Information.
Using the “Setup Assistant” to configure your new Mac Personalizing your new Mac.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
PPD Computing “Business Continuity” Windows and Mac Kevin Dunford May 17 th 2012.
The Trimble Store and Passcodes. Introduction to Trimble Store  This presentation will: –Explain what the Trimble Store offers you –Why you need to be.
Configuring Windows XP-Based Laptops for Guest Access to Bloomsburg University’s Wireless Network Intended for University staff, and guests planning to.
Week #7 Objectives: Secure Windows 7 Desktop
Customer Service and Support Sutherland Global Services Consultant Learning Services Microsoft Store.
PPD Computing “Business Continuity” David Kelsey 3 May 2012.
Chapter 3 Installing Windows XP Professional. Preparing for installation Pre-installation requirement; ◦ Hardware requirements ◦ Hardware compatibility.
ExamSoft at BU LAW Boston University School of Law Office of Systems & Technology.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
Scott Drucker, Systems Engineer Migrating to Microsoft Vista with WinINSTALL.
GEMINI Re-platforming Project September 2012 GRP External User Changes and Key Messages ahead of seeking approval.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
BIT 285: ( Web) Application Programming Lecture 15: Tuesday, February 24, 2015 Microsoft Azure Instructor: Craig Duckett.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
1 Copyright © 2015 Pexus LLC Patriot PS Personal Server Importing Virtual Appliance Image.
Getting Started Introduction Section 0 Lecture 1 Slide 1 Section 0 Slide 1 INTRODUCTION TO Modern Physics PHYX 2710 Fall 2004 Intermediate Lab Fall.
Encryption as a Preventive Countermeasure Sean Maher, Information Security Coordinator.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Summary: Unlike WindowsXP, Windows2000 wireless client utilities are different from vendor to vendor and even within versions of a vendor’s client utility.
RAL PPD Tier 2 (and stuff) Site Report Rob Harper HEP SysMan 30 th June
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Full Disk Encryption.
UNM Encryption Services in Development
Chapter 7: Using Windows Servers
Chapter Objectives In this chapter, you will learn:
Guide to Linux Installation and Administration, 2e
How to Fix the Automatic Repair Loop in Windows 8.1
Setup Microsoft Office 365 &
Presentation transcript:

Encryption Jack Roberts, PPD, RAL, STFC

Why? Government reaction to high profile data losses. STFC General Notices 30 th January, 1 st February staff are hereby instructed that no unencrypted laptops or drives containing personal data should be taken off STFC sites (30 th January)

What is Personal Data? A. Any information that links one or more identifiable living person with private information about them. B. Any source of information about 1,000 identifiable individuals or more, other that information sourced from the public domain. Consequently, all laptops and PDAs need to be encrypted before they can be taken off site. (1 st February)

What Product? CRITERIA CESG approved FIPS-140 Full Disk encryption Need to be able to manage centrally Transparent to the user BUT No Mac solution Only limited Linux support No dual boot solution Products used in STFC BeCrypt Pointsec for PC Pointsec Mobile Red Hat SuSE 9.x RHEL 4 NLD

BeCrypt Pointsec Mobile Quick fix ~5 installations in PPD/~100 in STFC No installation problems No central management console. Slightly more expensive than Pointsec for PC For PDAs Not yet used in PPD Tested on a few PDAs in STFC, only 1 successful install. Newer version being tested.

Pointsec for PC (now renamed as Check Point Full Disk Encryption?)

Installation Method Initial preparation. Installed like a normal application. Typically takes around 4 hours. Problems Has refused to install on one or two laptops. Not compatible with 64-bit Vista.

How Does It Work? BIOS Pointsec Authentication Screen OS Loads OS Loads User works as normal Log in to OS User Account Single Sign On (SSO) Enters users OS account details automatically.

Recovery Management Console Central store of recovery files. Unlocking user accounts/changing passwords remotely Decryption

License Key bug Temporary license key expired 21 st March (Good Friday......). Mad rush on Tuesday 25 th to distribute new license key to make sure laptops dont decrypt. Some laptops with the new key start decrypting – eek! Why? License key checks at logon that it can contact an IP address, i.e. No Network Connection = Invalid license = Laptop Decrypts.

Current Status In PPD: ~95% Windows Laptops encrypted ~75% of all Laptops encrypted. 0 laptops corrupted. In STFC: 724 laptops encrypted (6th June). Maybe one or two laptops corrupted.

For the future... Hope to be able to perform a risk assessment within the organisation. Hopeful that a Mac solution will soon be available. Start encrypting PDAs.

Any Questions?