Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.

Slides:



Advertisements
Similar presentations
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Advertisements

Erick Engelke Director, Engineering Computing January 10, 2010
Why AAA Digital Document Solutions? Are you still storing documents in file cabinets? Do you have a plan in case of fire or natural disaster? Is your company.
1 Creating a Data Backup Oakland University University Relations Updated - June 2006.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Information Systems Services Protecting Data – Keeping Safe Kevin Darley, IT Security Co-ordinator 8 th November 2012.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Safe Computing Dave Carter, CISSP Michigan State University College of Agriculture and Natural Resources.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Data Encryption Overview South Seas Corporation Jared Owensby.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Back Up and Recovery Sue Kayton February 2013.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
The Operating System The operation system (OS) is a set of programs that coordinates: Hardware functions Interaction between application software and computer.
Penn State University College Of Education Understanding College of Education Resources.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Easy Encryption: OS X and Windows 2K/Xp Shawn Sines OARTech August 8, 2007.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Chapter 4 Operating Systems and File Management. 4 Chapter 4: Operating Systems and File Management 2 Chapter Contents  Section A: Operating System Basics.
Data Stewardship May 13, 2010 Tom Barton R.L. Morgan Ron Kraemer.
Computers Are Your Future Eleventh Edition Chapter 4: System Software Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
What is the big idea behind the 12/3 Identity Finder scan? The system-wide scan on 12/3 is intended to permanently remove all PII and anything looking.
4 1 Operating System Activities  An operating system is a type of system software that acts as the master controller for all activities that take place.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
January Backing Up Your PC’s Hard Drive Dr. Michael Stachiw.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Cyber Security Awareness Month Using Your Laptop Safely On the Road Off-Campus Safe Computing Part 2.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Kuliah 4 Pengantar Teknologi Informasi Oleh Coky Fauzi Alfi cokyfauzialfi.wordpress.com Software.
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Encryption Initiative – UW Madison McAfee Endpoint Encryption (formerly SafeBoot) CTIG – March 20, 2009.
How Not to Lose the Only Copy of Your Research Storage and Backup Tools at Brandeis Melanie Radik and Raphael Fennimore Library & Technology Services Workshops.
Understanding Backup and Recovery Methods Lesson 8.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Introduction TO Network Administration
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
Computing Strategies. A computing strategy should identify – the hardware, – the software, – Internet services, and – the network connectivity needed.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
SY0-401 COMPTIA Security+ Certification Exam Vcepracticetest.com.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Windows Vista Configuration MCTS : Installing and Upgrading.
CompTIA Security+ Certification Exam SY
Instant File Recovery and Data Protection for Windows ® Networks.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Chapter 6 Protecting Your Files
UW-Madison Guidelines for Managing the Records of Departing Employees*
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Cyber Security Awareness Workshop
Chapter 3 Installing and Using Software
How to Install and Setup Quick Heal Antivirus Call
practice-questions.html If you Are Thinking about your dumps? Introduction:
Back Up and Recovery Sue Kayton October 2015.
Jeopardy Data Hardware & Software Files and Folders Networking Q $100
Presentation transcript:

Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1

Introductions Allen Monette Security Coordinator Office of Campus Information Security

Why are we here?

OCIS Brown Bag Series Worst Practices, or 10 Easy Steps to Loosing Your Data Protecting Your Laptop’s Data Using Your Laptop Safely on the Road Finding and Protecting Sensitive Data on Your Computer Protecting Data by Using Network and Server Scanning Tools

Effective Practices for Restricted Data Handling Risk Reduction Strategy Find It: Determine if you store or process restricted data. Are you at Risk? Delete It: If there is no business need for storing restricted data, securely delete it. Remove Risk Move It: If there is a business need for storing restricted data, move the data to a secure server for proper storage and handling. Transfer Risk Encrypt It: If there is a business need to store restricted data, encrypt the data. (Desktop Encryption) Mitigate Risk OR THEN Risk Reduction Strategies Risk Assessment

Why Encryption?

It’s 3am … Do you know where your laptops are? Full Disk Encryption protects against lost devices

Would you trust… this guy with your files? File and Folder Encryption protects specific data

How does it work?

File encryption Think of file encryption as a secret code A simple code: A=0 B=1 C=2 D=3 Etc A message:

Folder encryption Think of folder encryption as a safe deposit box

Full Disk Encryption Think of Full Disk Encryption like a bank vault

How does it really work?

File and folder Encryption Encrypts individual files or entire folders Requires authentication to decrypt and access the files

Full Disk Encryption Replaces the master boot record with a special pre- boot environment Encrypts the entire hard drive Preboot Authentication plus OS authentication Decrypts as files are used

How to choose between Full Disk and File/Folder?

When to use Full Disk Encryption Full Disk Encryption protects against lost devices

When to use file/folder Need an additional layer of security Need portability Need to support removable media

What is UW Madison doing?

Laptop/Desktop Encryption Project Full disk and file/folder encryption for PC Mac

Nice if you can get it

Product Selected

Where are we now? Installed on about 250 computers Registrar’s office, Financial Aid, Admissions, and UW Survey Center are leading the pack on installs UW Milwaukee purchasing their own licenses and running their own server Ready for more participants

How can I get Involved? Allen Monette Or Linda Pruss

Questions?