Easy Encryption: OS X and Windows 2K/Xp Shawn Sines OARTech August 8, 2007.

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Data Encryption Overview South Seas Corporation Jared Owensby.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
1 Distributed File System, and Disk Quotas (Week 7, Thursday 2/21/2007) © Abdou Illia, Spring 2007.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Chapter 7: Configuring Disks. Configuring File Systems Fat32 –First used with Windows 95 OSR2 –Smaller cluster sizes, more efficient storage up to 32.
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 24 NTFS Permissions and Sharing Printers 1.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
Module 6: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Implementing Disk Quotas.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
1 Chapter Overview Managing Data Storage Creating Dynamic Disks Implementing Storage Quotas Managing Compression and Encryption.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 7 Installing and Using Windows XP Professional.
Guide to Operating System Security Chapter 5 File, Directory, and Shared Resource Security.
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
Unit 3 Day 4. Warm-Up 1.Write the Now/Next Function Rule for3, -9, 27, -81, … 2.Write the Input/Output Function Rule for the table to the right: 3.In.
1 Computer Disk management Using Disk Management To open Disk Management: Click Start, right-click My Computer, and then click Manage. Under the Storage.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Lesson 9: Windows Management Ms. Tracy Digital Literacy.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
Managing Applications, Services, Folders, and Libraries Lesson 4.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Microsoft Windows XP Professional MCSE Exam
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Know your Operating System Thanks to Dina Sokol. An operating system is software (a computer program) that manages your computer.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Windows and Mac OSX.  Formatting a disk prepares it to accept data  NTFS on Windows  HFS+ on the Mac  There are lots of different formatting options.
Module 11: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Configuring EFS Recovery Agents Implementing Disk Quotas.
Warm Up 1) Solve: -2(x + 9) + 13 = -11 2) A triangle has side lengths of 5, 15, and 14. Is the triangle a right triangle? Why or Why not?
1 Lesson 9 Windows Management Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Instructor: Syed Shuja Hussain Chapter 4: Operating System Basics.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Windows Vista Configuration MCTS : Maintenance and Optimization.
Introducing, Installing, and Upgrading Windows 7
Lesson 9 Windows Management
Managing Data by Using NTFS
Administering Your Network
File System Management
Introducing NTFS Reliability Security Long file names Efficiency
Creating and Managing Folders
Windows Operating System
Tutorial 12 Managing and Securing a Database
Presentation transcript:

Easy Encryption: OS X and Windows 2K/Xp Shawn Sines OARTech August 8, 2007

Agenda What is Encryption? History of Encryption Types of Data Encryption Why Encrypt? Encryption’s Impact Commercial Tools: –PGP Whole Disk Encryption Free Encryption tools –FileVault –Windows EFS Caveats How to Encrypt –Enabling FileVault on OS X –Enabling EFS for an encrypted folder Questions?

What is Encryption? “Encryption is a procedure that renders the contents of a message or file unintelligible to anyone not authorized to read it.” Source: Kroll

History of Encryption The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. The development of cryptography has been paralleled by the development of cryptanalysis — of the "breaking" of codes and ciphers. Until the 1970s, secure cryptography was largely the preserve of governments. Two events have since brought it squarely into the public domain: the creation of a public encryption standard (DES); and the invention of public-key cryptography. Source: Wikipedia

Types of Data Encryption Two Types of Encryption methods: Cipher and Code based –Cipher is more common method today. Encryption can be applied to computer data in a number of ways: –Storage/Hard Drive Encryption: Protects Data at Rest –Traffic Encryption: Protects Data in Transit

Why Encrypt Encryption protects the university –ORC 1347: Exempt from notification of exposure of personal information if encrypted –Reduces risk of data loss through laptop/desktop theft –Keeps our research and secrets safe

Encryption’s Impact Encryption is only one method of protecting data and in this example is keyed to disk encryption specifically - not encrypted transport of information. Encryption is “free” –Consider impact on backup strategies and repurposing of [equipment] –Encryption also introduces support issues with data use and access that have costs in manpower and resources

Commercial Encryption Tools PGP Whole Disk Encryption –Encrypts physical hard drives and implements boot level protection. –Integrates with Active Directory –Centrally managed Private-key encryption system using PGP Universal Server –Offers Public-Key storage as well for users –Does not encrypt Mac boot drives currently –Has limitations in dealing with multi-user machine environments –OSU is currently piloting PGP for ODS users and some colleges

Free Encryption Tools 1.Macintosh OS X FileVault Protects user home directory and desktop On-the-fly encryption/decryption Uses login password; no secret code Can use Master phrase in case of user corruption 2.Windows EFS Protects files and folders Keyed to user to keep personal files safe from prying eyes Can have key backed up

Caveats Disk encryption increases wear on drives because of the on-the-fly read/write nature Many encryption forms are susceptible to corruption if users do not shut down properly or power off properly - UPS and frequent data backups mitigate this risk Both EFS and FileVault rely on users to do the right thing to protect the data - it is not a whole disk solution.

How to Encrypt: FileVault on OS X 1.Go to "System Preferences", then click on "Security". 2.If desired, click on "set Master Password" to set a master password. 3.Click on "Turn on FileVault" to turn on FileVault; select other options as desired. 4.When finished, close the FileVault window.

How to Encrypt: File Vault on OS X Notes : –FileVault only encrypts data stored in your user directory –FileVault is not a tool to protect against hackers or viruses –Because of the nature of encryption you should be careful to avoid force-quitting applications and minimize the number of improper shutdowns.

How to Encrypt: Windows EFS 1.Locate the files you want to encrypt We recommend that you encrypt folders as opposed to individual files – any new files you add to this folder will also be encrypted. 2.Select the file or folder and right-click on it; select “Properties”. 3.In Properties, select the “General” tab. 4.Select the “Advanced” button. The Advanced Attributes window will open and there will be 4 check boxes. 5.Check “Encrypt contents to secure data” (bottom). 6.Select “OK” button. EFS encrypts the file or folder.

How to Encrypt: WindowsEFS Notes: –Can only encrypt files and folders on NTFS file system volumes. –Cannot encrypt: compressed files or folders. If a compressed file or folder is encrypted, it will be uncompressed. files marked with the System attribute files in the system root directory structure

How to Encrypt: EFS Notes: –When a single file is encrypted, you are asked if you also want to encrypt the folder that contains it. –When a folder that contains files or subfolders is encrypted, you are asked if you want all files and subfolders within the folder to be encrypted. –If you choose to encrypt the folder only, all files and subfolders currently in the folder are not encrypted. –Any new files or subfolders added to the encrypted folder are encrypted once they are created.

Questions? Resources: 8help