ENCRYPTION EXERCISE ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………...…... RESEARCH DATA MANAGEMENT TEAM UK DATA.

Slides:



Advertisements
Similar presentations
PC Tips & Trouble Shooting I didnt know that! Short Cut Keys Short cut keys are an easy way to complete tasks on a computer.
Advertisements

File management GAP Toolkit 5 Training in basic drug abuse data management and analysis Training session 2.
Protect Your Data: How to Store and Back up your Data Securely Open Access and Data Curation Team With thanks to the UKDA for allowing us to reuse and.
Click Here for Download the Installation Files Click Here for Guide How to Extract Installation Files.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Hard Drive Information Module Hard Drive Information Module.
DATA LIFECYCLE & DATA MANAGEMENT PLANNING ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
WinZip Basics Chris Comito Marybeth MacLean Jameelah Roberts Matt Smith.
STORING YOUR DATA ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA MANAGEMENT TEAM UK DATA.
Introduction to Computers II A Presentation of the Elmhurst Public Library.
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD- ROM drive. Your PC should automatically detect the CD and you will get a message saying.
File Management and Organisation © Copyright William Rowan 2007.
1 Mapping a Drive on the USF IIS Server. 2 Mapping a Drive To map a drive to a network file directory in Windows you must be on a Microsoft local area.
System Resources INFO1119 (Fall 2012).
Beyond the Computer Basics Working with applications, files and folders Last Updated: March 2008.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
TRUECRYPT.
I Can… Define basic file management and related terms Identify levels of a file system Identify and explain ways to view files in Windows OS Explain the.
Why Copy , Attachments and other files to CD or DVD? Backup mail & files in case of computer failure or disaster. Archive old messages & files before.
Teach Yourself Windows 95 Module 2: Files, Folders, and Features.
Cambridge University Library Back-up, Storage and Sharing Helping you put into practice what you know you ought to be doing… Cambridge University Library.
 For Oracle Based Products  Windows XP Professional-SP3 / Window7-SP1 (32 Bit)  Min. Dual Processor or above  RAM 2GB or above  Internet explorer.
Download Dropbox Download should start immediately Save download file:
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Installing Ricoh Printers There are two basic steps: 1. Acquire the drivers. 2. Use the Windows Add Printer Wizard to install the drivers within the operating.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Introduction to Windows7
File Management Presented to The Glades Computer Club January 4, 2001.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
This example is a step by step walkthrough for installing the SRH Front Desk printer in Windows 7 (64 Bit).
Introduction to Derby. RHS – What is Derby…? Derby is a DBMS –Database –GUI for administration –GUI for data maintenance Best part; integrated.
UNDERSTANDING YOUR COMPUTER
Using Windows Explorer Windows explorer is different from Internet Explorer It is a Windows program designed to let you explore your hard drive and manage.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
Lesson 12: Using the Recycle Bin deleting files or folders what the Recycle Bin is restoring files from the Recycle Bin emptying the Recycle Bin identifying.
IPad Remote Control w. Splashtop 2 3Shape TRIOS ®.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Windows and File Management
Choose a folder on the remote machine. For e.g. if there is a machine named comp1 in your network, please choose a folder in that machine which you will.
Using TrueCrypt with TaxWise How to guarantee security without spending any of AARP’s cash.
File Management In this exercise the A drive is used as an example. If you are using another storage device, substitute that drive letter (D, E, F…) where.
How to Back Up In 10 Easy Steps. Step 1: Double click on My computer. You should see something like this. WatchWatch.
Copy of the from the secure website - click on the AccoridaLife.zip link.
How to use the Hand-In Folder. Click on the Folder icon at the bottom of the screen.
STORING YOUR DATA: SECURITY BREACHES ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA MANAGEMENT.
1 Mapping a Drive on a USF IIS Server. 2 Mapping a Drive To map a drive to a network file directory in Windows you must be on a Microsoft local area network,
HOW TO INSTALL WINDOWS 7? This step-by-step guide demonstrates how to install Windows 7 Ultimate. The guide is similar for other versions of Windows 7.
Reset Windows 10 Forgotten Local Admin Password. Just take it easy, if you’ve forgotten Windows 10 local admin password and can’t log onto your PC. Here.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
TechKnowlogy Conference August 2, 2011 Using GoogleDocs for Collaboration.
How to Create and Use a VericrYPT CONTAINER
 There are three things to get Trend Micro software for your PC. They are Download, Installation and Activation of the software license. Trend Micro.
How To Make The Backup Of AVG Antivirus 2017 Definitions.
Windows 7 and file management
Navigation and File Management
UNDERSTANDING YOUR COMPUTER
Student Monmouth College
Information Protection & Cyber Security
How To Install Panda Antivirus For Mac?
Firstly you need to get “Get the Anniversary Update now” and then the file will start downloading automatically. After it completes its process, run.
Services Course 9/9/2018 3:37 PM Services Course Windows Live SkyDrive Participant Guide © 2008 Microsoft Corporation. All rights reserved.
Things To Avoid: 1-Never your password to anyone.
File Stream and Team Drives
File Management File Explorer © EIT, Author Gay Robertson, 2017.
VeraCrypt User Guide Cross platform desktop encryption made easy
Using TrueCrypt 6th May 2009.
NSC IT Services’ Handy onedrivemapper Tool
Google File Stream Google Drive Updates.
Presentation transcript:

ENCRYPTION EXERCISE ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………...…... RESEARCH DATA MANAGEMENT TEAM UK DATA ARCHIVE UNIVERSITY OF ESSEX ……………………………………………….…………………. LOOKING AFTER YOUR RESEARCH DATA: AN ESRC ADVANCED TRAINING NETWORK COURSE UK DATA ARCHIVE, COLCHESTER, APRIL 2012

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE ENCRYPTION this exercise allows you to create an encrypted storage space on your drive encrypt anything you would not send on a postcard for moving files e.g. transcripts for storing files e.g. shared areas, mobile devices

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE WHAT IS ENCRYPTION? encryption transforms data to make it unreadable to anyone except those with a key encryption comes in strengths. A higher key size takes exponentially longer to crack

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE WHY KEY SIZE MATTERS Key sizeTime estimated to crack using a dedicated super computer Related experience 80 millisecondsFar, far less than the time needed to read this 561 secondBlip 645 minutesLong enough to apologise for accidentally exposing data trillion yearsLonger than the history of the universe 256Over a quadrillion yearsA number greater than the number of atoms in the universe

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE ENCRYPTION SOFTWARE it is easy to use – honest! we will show you how SafeHouse good for portable storage doesn’t need administrative rights to install 256-bit encryption TrueCrypt good for hard drives 256-bit encryption AxCrypt

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE ENCRYPTING A SPACE download SafeHouse explorer from (Windows only) install open SafeHouse Explorer

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE CREATE A NEW VOLUME click on ‘New Volume’. follow the wizard by clicking ‘Next’

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE CHOOSE A NAME AND LOCATION

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE VOLUME SIZE set the size you want in kilo/mega/gigabytes remember to leave 5mb for the safehouse.exe file

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE CREATE A PASSWORD/PASSPHRASE incorporate a range of upper and lower case letters, number, and other characters don’t forget it!

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE CREATE VOLUME create your encrypted area by clicking on ‘Create Volume’ and click ‘Finish’

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE COPY OVER YOUR FILES Open Volume (given drive name, here E: ) drag in your files – Copy or Secure Move when done, press the ‘Close Volume’ icon files now locked up

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE COPYING THE.EXE FILE final stage is to copy the.exe file so you can open your encrypted space on other devices (e.g. memory sticks) find the SafeHouse Explorer folder and.exe file you downloaded

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE COPYING THE.EXE FILE paste into the area where you are storing your Encrypted files. This will allow you to open your area on other devices that don’t have SafeHouse installed My encrypted area

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE OPENING YOUR ENCRYPTED AREA click on the padlock icon - SafeHouseExplorer.exe

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE OPENING YOUR ENCRYPTED AREA click on ‘Open Volume’ select your Volume file (here SafeHouse.sdsk click ‘Open’

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE OPENING YOUR ENCRYPTED AREA enter your password and click ‘Open’

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE CLOSING YOUR AREA your files should appear. When you’ve finished, click on ‘Close Volume’

……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………………………………………………………………………….…………………………..… UK DATA ARCHIVE CONTACT UK DATA ARCHIVE UNIVERSITY OF ESSEX WIVENHOE PARK COLCHESTER ESSEX CO4 3SQ ……………………….…………………….…. T: +44 (0) E: W: ……………………………….………………..