ENCRYPTION Coffee Hour for August 2014. HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.

Slides:



Advertisements
Similar presentations
Macintosh OS X. What is an operating system? O Like cars, computers have operating systems (sometimes abbreviated OS). O A computer operating system is.
Advertisements

This presentation will take a look at to prevent your information from being discovered by and investigator.
Miscellaneous Windows 2000 Desktop Features Windows 2000 Intermediate.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Installing Windows XP and Windows Installing two different versions of Windows on the same machine. In this example, Windows 2000 and Windows XP.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Week:#14 Windows Recovery
Security Computing Practices Plamen Martinov Chief Information Security Officer.
Changing the iPhone 5 from 3G mode to LTE mode. *IMPORTANT BEFORE YOU START!* iPhone MUST be charged and you MUST have access to iTunes.
Source XP vs Windows 7 XPWin 7.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
Blue Ray DVD/DVR Players
Windows Tutorial 9 Maintaining Hardware and Software
Setting Parent Controls on a MacBook, iPhone, iPod, iPad, PC, & Android Devices An Old Mill Presentation.
Confidential [Offline] Regular Demo installation SOP for ME172V.
Introduction to Computers Connie Dalrymple. What is a computer? Sources:
Chapter 7 Working with Files.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
Configuring the MagicInfo Pro Display
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Installing the SAFARIODBC.EXE For use with Excel May 3, 2002.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
TERMS TO KNOW. Desktop This does not mean a computer desktop vs. a laptop. You probably keep a number of commonly used items on your desk at home such.
Week #7 Objectives: Secure Windows 7 Desktop
Confidential [Offline] Regular Demo installation SOP for ME301T.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
How computers work Learning objective 2: Explain the four basic functions of a computer.
MICROSOFT WORD GETTING STARTED WITH WORD. CONTENTS 1.STARTING THE PROGRAMSTARTING THE PROGRAM 2.BASIC TEXT EDITINGBASIC TEXT EDITING 3.SAVING A DOCUMENTSAVING.
How KeePass password safe can save you time and energy
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
1 OPOL Training (OrderPro Online) Prepared by Christina Van Metre Independent Educational Consultant CTO, Business Development Team © Training Version.
Microsoft Office 2008 for Mac – Illustrated Unit C: Understanding File Management.
MICHAEL J MONROE. What is ? Collection of online services and software offered by Apple. Compatible with Mac OSX, Windows, iPhone, and iPod Touch. Released:
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Understanding Backup and Recovery Methods Lesson 8.
IPhone iOS7 Setup and Activation. Hello When the device is turned on, the first screen you will see is the iPhone Hello screen. On this screen you will.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
SQL SERVER 2008 Installation Guide A Step by Step Guide Prepared by Hassan Tariq.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
XP New Perspectives on Microsoft Windows XP Tutorial 2 1 Microsoft Windows XP Working with Files Tutorial 2.
Transfer Music from iPhone to Computer From:
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Advance startup options Shift Restart. Restart options.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
How to fix Netflix Signing In Issues? For More Details Visit Our Website
How To Reset an HP Computer Without a Restore Disc?
File Management in the Cloud
Chapter Objectives In this chapter, you will learn:
CS101 Booting A Computer.
OS X Yosemite Troubleshooting 9L0-066 Exam Questions Pack
How to Reset iCloud Password. About iCloud : iCloud is a cloud storage and cloud computing services. iCloud was launched on 12 October, 2011 and was.
4 Windows 7.
Microsoft Word 2003 Illustrated Complete
ICloud Password Recovery Phone Number |
Encryption The Good kind of obscurity
RR RR Problems Along With Solutions For iPhone And iPad Toll Free ( )
Tips and Techniques to clear an iMac Hard Drive.  Launch the “Apple” menu and then select “Restart” to restart your iMac automatically.  Now, you need.
ICloud Password Recovery | Reset Number
AirDrop Not working issue on MacBook Pro, iMac & iOS 11
Microsoft Excel All editions of Microsoft office.
About AirPrint AirPrint is an Apple technology that helps you create full-quality printed output without the need to download or install drivers.
Windows xp PART 1 DR.WAFAA SHRIEF.
Windows Tutorial 9 Maintaining Hardware and Software
Managing and Monitoring Screen Time
The bios.
Presentation transcript:

ENCRYPTION Coffee Hour for August 2014

HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message Caesar cipher – encrypted communications by substituting one letter for another, usually a shift of 3 letters in the alphabet Enigma Machine – Sophisticated for its time, allowed Germans to encypt communications during World War II, used rotors to substitute characters

WHAT IS ENCRYPTION? Encryption uses complex mathematical formulas to take plain text and turn it in to cipher text Example: Plain Text: Coffee Hours are great! Encryption happens… Cipher Text: jusklad nasdl ksd hd;klq Cipher text can’t be read unless you have the “key” that will turn it back into plain text Keys can be passwords, PINs, even smart cards

WHY SHOULD I ENCRYPT? Encryption ensures confidentiality Its all about keeping your private files, private Its simple to do, in fact you use it without even realizing it when you shop online or use your bank’s customer portal

TYPES OF ENCRYPTION Data at rest Full Disk Encryption (FDE) This has to be turned on, it is not on by default in most operating systems Protects the contents of your entire drive Data in motion Secure Sockets Layer (SSL) This happens behind the scenes. When you are on a banking or retail site and you see or the padlock icon, it means that SSL is being used to encrypt your data. You don’t have to do anything to get this to work. Your computer and the organization’s server work out the details on their own

BITLOCKER Bitlocker provides full disk encryption for Microsoft Windows systems It relies on a chip (TPM) on the motherboard, which stores the encryption key. Save your recovery key in a safe place like an external hard drive, flash drive or CD. If Bitlocker detects any errors (disk errors, change to BIOS, changes to startup files) you will need to enter the recovery key to regain access to your files It is available in these versions of Windows: Windows Vista Windows 7 Ultimate Windows 7 Enterprise Windows 8.1 Pro Windows 8.1 Enterprise

HOW TO TURN ON BITLOCKER Be sure that you are connected to a reliable power source Go to Start  Control Panel  System and Security Click on Bitlocker Drive Protection Click Turn On Bitlocker – This opens the Bitlocker Setup wizard. Follow the instructions in the wizard Your computer will be restarted, then Bitlocker will begin encrypting the drive

FILEVAULT FileVault provides full disk encryption for Mac OSX operating systems It is available on Mac OSX Lion (10.7) or later and you must have a recovery drive on your system (You can get to this by holding command + r while your Mac boots) All user accounts must have a password set When enabling FileVault, you are given a recovery key. Save this in a safe place. If you forget your password, this is the only way for you to get in to your system Apple provides storage of your recovery key in iCloud. You will have to set up 3 security questions. You must be able to give the exact answer, they are case sensitive. This is a great backup in case you lose the key and you forget your password. Note: You do need to have an iCloud account for this to work.

HOW TO TURN ON FILEVAULT Be sure that you are connected to a reliable power source Go to System Preferences  Security and Privacy Click on the FileVault tab Choose “Enable FileVault” (If this option is grayed out you may need to click on the padlock to make the change) If there are more than one user accounts, you will be asked which accounts may be used to access the encrypted drive. You will need to enter the password for each of the accounts You will be shown your recovery key next. Make a copy of this key. You can store it with Apple as well You will now be prompted to restart your Mac. When it comes back up it will begin encrypting the drive

IPHONES/IPADS (IOS) Encryption available for: iPhone 3GS and later All iPad models iPod Touch (3 rd generation or later) Apple refers to this as data protection Data protection is enabled when you set a passcode on your Apple iOS device

HOW TO TURN ON DATA PROTECTION Tap Settings  General  Passcode Follow the prompts to create a passcode After the passcode is set, scroll down to the bottom of the screen and verify that “Data protection is enabled” is visible Passcode Tips Set require passcode immediately Disable simple passcode to use longer, alphanumeric passcodes Enable erase data to automatically erase the device after ten failed passcode attempts

ANDROID Encryption can cause some slowness because of the overhead on the system The initial encryption time varies but is usually about an hour. Don’t interrupt this process. Encryption is irreversible on Androids. The only way to remove it is to perform a factory reset, which also wipes your device’s data. To access your Android once you have encrypted it, simply type in your password

HOW TO ENCRYPT YOUR ANDROID Note: Menus may vary by manufacturer Ensure that you are connected to a reliable power source Set a PIN or password for the lock screen Go to Settings  Security and select Encrypt Phone or Encrypt Tablet (The encryption menu may move around, for instance it is under the Storage menu on some HTC devices) Press the Encrypt button at the bottom

HOW TO ENCRYPT YOUR ANDROID You may also use 3 rd party apps to encrypt your phone rather than the native feature in the Android operating system Some favorites include: SSE – Universal Encryption App (free) Encryption Manager (around $4) NOTE: Some Sony phones do not have the native encryption feature so you would need to use a 3 rd party app like those above