Naval Medical Center Portsmouth Sending and Receiving Protected Information via Electronic Mail Information Management Department Training Division.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Digital Certificate Installation & User Guide For Class-2 Certificates.
® Microsoft Office 2010 Browser and Basics.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Steps to Recover Private Encryption Keys
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Meganet Corporation VME Mail Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
How to Get The Most Out of Outlook 2003 Michele Schwartzman Division of Customer Support Summer 2006.
Utica Community Schools Technology Department
Configuring Active Directory Certificate Services Lesson 13.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely John Deere presents:
Digital Logic and State Machine Design Installing Xilinx WebPACK 12.4 CS 2204 Digital Hardware.
LGC Website and Customer On-line Tools LGC RESOURCE 2014.
Pasewark & Pasewark 1 Outlook Lesson 1 Outlook Basics and Microsoft Office 2007: Introductory.
Outlook Lesson 5 Managing Contacts Microsoft Office 2010 Advanced Cable / Morrison 1.
Masud Hasan Secue VS Hushmail Project 2.
Delight QuickBooks Online Banking Internal Support Training QuickBooks Windows 2009/2010 Online Banking.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Lifecycle Workstation Operator Training: PIN Reset and Certificate Update Updated April 17, 2012.
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
1 Enterprise How to access your from the web.
Parent Guide for staying connected. To Begin using Skyward Family Access you will need:  A computer connected to the internet  A web browser (Windows.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
1 INITIAL SETUP OF THE ST ScI ELECTRONIC GRANTS MANAGEMENT SYSTEM BY AO DESIGNEES September, 2000.
University Health Care Computer Systems Fellows, Residents, & Interns.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT OUTLOOK Lesson 1 – Outlook Basics and .
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Microsoft Access 2010 Chapter 10 Administering a Database System.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
CHCS MAILMAN USER REFERENCE GUIDE UPDATED MARCH 2014
XP Browser and Basics COM111 Introduction to Computer Applications.
ARMS Advanced Risk Management System User Documentation.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTION Lesson 1 – Microsoft Office 2003 Basics and the Internet.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTION Lesson 1 – Microsoft Office 2003 Basics and the Internet.
Double click on the Internet Explorer Icon on your Desktop. This should take you to the Polytechnic of Namibia Intranet Home site or Click on this link.
SNG via Webinar. Where’s Webinar??  Double click Aflac 2000 folder  Highlight “SNGWebCommunicator”  Right Click and “Send To - Desktop”
Instructions for the Access Card Utility 1.2 Self-service renewal of your HHS digital certificates using your Windows computer US Department of Health.
Joshua ISD Technology Training. Word 2013 Opening Word 2013  Click the Start button  Enter “word” in the Search box  Click on the Word 2013 when it.
TWFG Branch Meeting – 1 st Quarter Logging In AMP was designed for use with Chrome. While some features may work in Internet Explorer, we recommend.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
Sending effective and professional s . Session aims and objectives Lesson Aims and Objectives send s that are fit for purpose and audience.
Digital Signature Acceptance Process Steps to be Followed for
How Can NRCS Clients Use the Conservation Client Gateway
INFORMATION TECHNOLOGY NEW USER ORIENTATION
To the ETS – Accounts Setup and Preferences Online Training Course
Installation & User Guide
Performing these fixes “should” fix most access problems.
Microsoft Word 2003 Illustrated Complete
Welcome to FOCUS FOCUS website:
An Installation Guide of PGP on Windows 2000
DoD PKI Automatic Key Recovery
Installation & User Guide
DIGITAL ENCRYPTION INSTRUCTIONS FOR MICROSOFT OUTLOOK 2007
To the ETS – Accounts Setup and Preferences Online Training Course
Presentation transcript:

Naval Medical Center Portsmouth Sending and Receiving Protected Information via Electronic Mail Information Management Department Training Division

INTRODUCTION In order for Navy Medicine personnel to send and receive sensitive information via , they must be able to digitally sign and encrypt the messages in government furnished equipment and software, specifically Microsoft Outlook This slide presentation will outline the policy and procedures for compliance with current instructions.

INSTRUCTIONS NAVMED Pol of 28 Jan 08 (click to view)NAVMED Pol of 28 Jan 08 “All Navy Medicine personnel shall protect sensitive information from unauthorized access and disclosure…” DOD Inst IA Implemen. 06 Feb 03 DOD R, DOD Health Information Security Regulation of 12 July 07 SECNAVINST E, DON Privacy Program DON CIO Washington D.C Z Oct 04

OVERVIEW In order to understand the digital signature and encryption of , it is important to first understand the following terms: Establishment of Trust Public Key Infrastructure Public Key Cryptography Public Key Certificate

DIGITALLY SIGNING OR ENCRYPTING A MESSAGE IS HOW AN INDIVIDUAL PROVES THEIR IDENTITY, OR ESTABLISHES TRUST, OVER A NETWORK. TRUST BETWEEN END USERS OVER A NETWORK REQUIRES A THIRD PARTY INFRASTRUCTURE, OR PUBLIC KEY INFRASTRUCTURE (PKI). ESTABLISHING TRUST

PUBLIC KEY INFRASTRUCTURE PKI THE FRAMEWORK/SERVICES THAT PROVIDE FOR THE GENERATION, DISTRIBUTION, CONTROL, TRACKING, AND DESTRUCTION OF PUBLIC KEY CERTIFICATES. PKI ENABLES THE USE OF ENCRYPTION, DIGITAL SIGNATURE, AND ACCESS AUTHENTICATION SERVICES IN A CONSISTENT MANNER ACROSS A WIDE VARIETY OF APPLICATIONS.

SECURITY BENEFITS OF PKI AUTHENTICATION-ASSURES A PERSON/SYSTEM IS EXACTLY WHO/WHAT THEY CLAIM TO BE. DATA INTEGRITY-ASSURES TRANSMITTED DATA HAS NOT BEEN ALTERED. NON-REPUDIATION-PROTECTS AGAINST A PERSON DENYING LATER THAT A COMMUNICATION TOOK PLACE. CONFIDENTIALITY-PROTECTS AGAINST DISCLOSURE OF INFORMATION TO UNAUTHORIZED USERS.

PUBLIC KEY CRYPTOGRAPHY Public Key Cryptography is the physical implementation of individual identity and security in the PKI via assignment of “Key Pairs” * A KEY IS AN ELECTRONIC FILE. *A PAIR OF KEYS IS CREATED AT THE SAME TIME BY SPECIAL SOFTWARE. *INFORMATION ENCRYPTED WITH ONE KEY CAN ONLY BE DECRYPTED WITH THE OTHER KEY. USER’S PRIVATE KEY USER’S PUBLIC KEY

ENCRYPTION - , ATTACHMENTS, DOCUMENTS, AND FILES CAN BE ENCRYPTED SO THAT ONLY THE RECIPIENT CAN READ THEM. DIGITAL SIGNATURES- ELECTRONICALLY SIGN , DOCUMENTS, AND FORMS WITH DIGITAL SIGNATURE. SECURE COMMUNICATIONS WITH WEB SITES- YOU KNOW THE WEB SITE YOU ARE ACCESSING AND IT KNOWS WHO YOU ARE (MUTUAL AUTHENTICATION) PUBLIC KEY CRYPTOGRAPHY PUBLIC KEY CRYPTOGRAPHY FACILITATES THE FOLLOWING TASKS:

PUBLIC KEY CERTIFICATE AN ELECTRONIC DOCUMENT THAT OFFICIALLY LINKS TOGETHER A USER’S IDENTITY AND PUBLIC KEY. CERTIFICATES ARE STORED IN A DIRECTORY SERVER AND MAY BE SENT WITH SIGNED . USER’S IDENTITY USER’S PUBLIC KEY VALIDITY PERIOD ISSUER’S SIGNATURE

ENCRYPTION When sending , sensitive information must be ENCRYPTED under the following conditions: 1.PHI – Personally identifiable medical information under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) (Examples: Names, Social Security Numbers, Medical Record Numbers, Health Plan Beneficiary Numbers, Phone and Fax numbers, addresses) 2.PII - Personally Identifiable Information protected under the Privacy act of 1974 (Examples: Full Name (if not common), telephone number, street address, address, driver’s license number, credit card numbers)

ENCRYPTION (cont.) 3.OPSEC Indicators (Examples: valuable information to adversaries, such as large group or troop movements, habits at work, financial transactions) 4.Confidential Contract Information 5.Other Sensitive information not approved for public release NOTE: All s containing PHI or PII shall be marked as “FOR OFFICIAL USE ONLY (FOUO) – PRIVACY SENSITIVE. Any misuse or unauthorized disclosure may result in both civil and criminal penalties.” ENCRYPTION ICON IN MICROSOFT OUTLOOK 2003

DIGITAL SIGNATURE must be DIGITALLY SIGNED under the following conditions: 1.Official Business 2.Requests or responses to requests for resources 3.Organization position/information external to the organization (division, department, command). 4.Contract information, financial or funding matters 5.Personnel management matters 6.In addition to encrypting for all messages qualifying for ENCRYPTION DIGITAL SIGNATURE ICON IN MICROSOFT OUTLOOK 2003

REQUIRED ITEMS In order for personnel to be able to send and receive encrypted and digitally signed , there are certain required items for workstation setup and then Outlook configuration: 1.Current CAC (Common Access Card) and PIN. You have to put your CAC in the card reader and use your PIN # when you want to send this type of . Your CAC card contains “certificates”, a way of verifying your identity. The framework and services that control these public key certificates is called the Public Key Infrastructure or “PKI”.

REQUIRED ITEMS 2.Identified Workstation. Setup and configuration of Microsoft Outlook 2003 will only be valid for the workstation on which you set it up. If you travel to another, you have to set it up again. 3.Current Card Reader. The current CAC Reader is ActivClient 6.1 x86. You must also see the associated card reader icon in the task bar/tray in the lower right hand area of your computer screen. When you insert your card, the icon should change as noted below: ‘ActivClient Agent - No Smart Card’‘ActivClient Agent – Smart Card Inserted’

4.Microsoft Outlook 2003 – You must have a fully functioning Microsoft Outlook 2003 office application installed on your government computer. REQUIRED ITEMS FOR ANY HARDWARE OR SOFTWARE PROBLEMS, CONTACT THE IMD HELPDESK AT OR **ITEMS 1-4 MUST BE IN PLACE BEFORE PROCEEDING**

1.Step One: Insert CAC (Common Access Card) into Keyboard or Card Reader SETUP NOTE: Make sure that the icon in the tray changes to reflect the card insertion:

SETUP (cont.) 2.Step Two: Reviewing Your Certificates (in Internet Explorer) Step 1: Go to TOOLS- INTERNET OPTIONS Step 2: Click on Content Tab, and then Click “Certificates” Step 3: Verify current certificates (make sure they are up to date); you may remove the old ones (delete the outdated ones), and close. Then, click on ‘Clear SSL State’, apply, and OK.

SETUP (cont.) 3.Step Three: “Making Your Certificates Available To Windows” (you need to do this to install your Certificates on your workstation): Step 1: Double click on ‘ActivClient Agent’ icon in system tray area of desktop. Step 2: Pull down the TOOLS menu and select ADVANCED-MAKE CERTIFICATES AVAILABLE TO WINDOWS. Click ‘OK’ after you are successful. NOTE: If the icon indicates that it is “ActiveGold” versus “ActivClient”, then you have the OLD version of the CAC Reader installed and you need to contact the IMD Helpdesk at

SETUP (cont.) Before exiting out of the program, double click on “My Certificates”, then on the “Signature” and “Encryption” Certificates to verify your address. If your address is INCORRECT, exit out of the window and you will need to update it via one of the 3 methods below before proceeding (ensure your certificates are still valid, i.e. not revoked or expired): 1.Update it yourself at the following link: 2.Go to any of the CAC PIN reset stations. Go to the following link to find the CAC reset station nearest you: CAC Reset Stations 3.Call the IMD Helpdesk at for assistance

OUTLOOK CONFIGURATION The next steps require configuring Microsoft Outlook 2003 so that can be digitally signed and encrypted: 1.Step One: Open Microsoft Outlook Click on TOOLS- OPTIONS 2. Select the SECURITY Tab. Leave only the ‘Send clear text…’ box checked for now, otherwise ALL of your outgoing will automatically be digitally signed. Next, click on the “Settings” button.

2.Step Two: Change Security Settings 1. Make sure “Active Client Certificates” is in the ‘Security Settings Name’ and that all of the boxes are checked. 3. Click on the 2 nd “Choose” button. Click on the remaining certificate and “OK”, and then “OK” again. 2. Click on the 1 st “Choose” button. Click on the ‘DOD …Smart Card’ certificate and “OK”. This certificate may be listed 1 st or 2 nd for you, so look closely. OUTLOOK CONFIGURATION

2.Step Three: Publish to the Global Access List (GAL) 1. Click on ‘Apply’, and then on the “Publish to GAL” button on the bottom left. Once they have been published successfully, click on “OK”, and then click on “Apply” and “OK”. Enter your CAC PIN when prompted, and then OK after it is accepted. OUTLOOK CONFIGURATION

SENDING A DIGITALLY SIGNED MESSAGE To prepare to send a digitally signed message, make sure that you have Microsoft Outlook 2003 open and “New Message” selected. 1. Click on NEW MESSAGE. You should see two new “envelope” icons in the Standard Toolbar. If not, from the main menu select TOOLS-CUSTOMIZE and check the box for “show standard and formatting toolbars on 2 rows” 2. To digitally sign a message, click on the envelope with the red “digitally sign” symbol on it before sending. You will have to insert your CAC and enter your PIN.

SENDING AN ENCRYPTED MESSAGE 1. To encrypt a message, you need to click on the envelope with the blue ‘padlock’ on it before sending the message. 2. When encrypting, you must also digitally sign, so both “envelope” icons must be selected. 3. You will be required to insert your CAC and type in your PIN before the message can be sent.

Department of Defense (DoD) Global Directory Service If you cannot send an encrypted message to another user (this usually happens if the individual has a Department of Defense address outside of the Global Directory), you will need to go to a place called the “Department of Defense (DoD) Global Directory Service” to retrieve their Public Key Certificate. This is an example of the error message that you might see in Microsoft Outlook 2003 if you are unsuccessful in sending an encrypted message to another user:

Department of Defense (DoD) Global Directory Service Type in the last name (at a minimum) of the individual whose certificates you want to retrieve and click SEARCH. To get to this “DoD-wide repository” in order to search for and retrieve a certificate, go to (CAC is required). The website will look like the picture below:

Department of Defense (DoD) Global Directory Service After clicking on the SEARCH button, one or more users will appear in a window like the one below. Click on the last name of the desired user to expand the certificate: Under “Certificate Download Options”, click “Download Certificates) as vCard…

Department of Defense (DoD) Global Directory Service Once the next window appears below, click on “Hardware (CAC) Certificate for…” under “Select a certificate from the available certificates for vCard download.” This window will pop up right after you click “Hardware (CAC) Certificate for…” the user that you have selected. Click on ‘OPEN’ (NOTE: YOU MUST HAVE MICROSOFT OUTLOOK 2003 OPEN FOR THIS TO WORK!).

Department of Defense (DoD) Global Directory Service After clicking OPEN, the user’s Contact information will automatically open in Microsoft Outlook and you can click on the “Certificates” tab to view the certificate. SAVE AND CLOSE the Contact. If the individual is already in your Contacts List, you will receive a “Duplicate Contact Detected” message and be prompted to “Update new information...” if you desire.

PROBLEMS/ASSISTANCE ACCESS IT SUPPORT VIA INTRANET ACCESS IA (INFORMATION ASSURANCE) VIA IT INTRANET LINK CALL IT (INFORMATION TECHNOLOGY)