Understand Encryption LESSON 2.5_A 98-367 Security Fundamentals.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Rambling on the Private Data Security
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Rodney Buike IT Pro Advisor, Microsoft Canada
This presentation will take a look at to prevent your information from being discovered by and investigator.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
BitLocker: deep details, improvements and benifits
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
1.1 Installing Windows Server 2008 Windows Server 2008 Editions Windows Server 2008 Installation Requirements X64 Installation Considerations Preparing.
Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Week:#14 Windows Recovery
BitLocker™ Drive Encryption Hardware Enhanced Data Protection
Windows 7 Windows Server 2008 R2 VirtualizationVirtualization Heterogeneous Server Environment Inventory Linux, Unix & VMware Windows 7 & Server 2008.
File System and Full Volume Encryption Sachin Patel CSE 590TU 3/9/2006.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Virtual techdays Desktop Security with Windows 7 AppLocker & BitLocker to Go Aviraj Ajgekar│ Technology Evangelist │Microsoft Corporation Blog:
Lesson 10 Operating System Customization
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Chapter 7 Installing and Using Windows XP Professional.
Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design
TRUECRYPT.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Troubleshoot Access, Authentication, and User Account Control Issues Lesson 8.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
Hands-On Microsoft Windows Server 2008
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 14 Windows XP Professional 1.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Week #7 Objectives: Secure Windows 7 Desktop
Windows 7 for Information Workers NetCom SME: Neil Masih.
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
C HAPTER 7 Managing Disk and File System. I NTRODUCING DISK MANAGEMENT 2 types of hard disk storage supported by Windows XP are: basic hard disk & dynamic.
Module 1: Installing Microsoft Windows XP Professional.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
11 BACKING UP AND RESTORING SYSTEMS AND DATA Chapter 15.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Chapter 14 Supporting Windows 2000 Professional. 14 You Will Learn… n About the different operating systems within the Windows 2000 suite n About the.
Windows Vista Inside Out Chapter 28 - Chapter 28 - Managing Disks and Drives Last modified
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
1 Understanding Hardware Profiles A hardware profile stores configuration settings for a set of devices and services. Microsoft Windows 2000 can store.
(ITI310) By Eng. BASSEM ALSAID SESSION 2: Server Configuration & Administration Notes SAT 31-Oct-2015.
Understanding Backup and Recovery Methods Lesson 8.
Module 5: Configuring and Managing File Systems. Overview Working with File Systems Managing Data Compression Securing Data by Using EFS.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Understand Permissions LESSON Security Fundamentals.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Module 11: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Configuring EFS Recovery Agents Implementing Disk Quotas.
Windows Installing or Upgrading to Windows 2000.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
UNM Encryption Services in Development
Configuring Encryption and Advanced Auditing
Lesson 10 Operating System Customization
Using TrueCrypt 6th May 2009.
The bios.
Instructor Materials Chapter 5: Windows Installation
Presentation transcript:

Understand Encryption LESSON 2.5_A Security Fundamentals

LESSON 2.5_A Lesson Overview In this lesson, you will learn about: Key features of EFS (encrypted file system) BitLocker ® & BitLocker ToGo ® Trusted platform module (TPM) Mail encryption & signing

Security Fundamentals LESSON 2.5_A Anticipatory Set  What threats does BitLocker protect against?  What do you want to protect with BitLocker?

Security Fundamentals LESSON 2.5_A BitLocker & BitLocker ToGo  BitLocker drive encryption provides enhanced protection against data theft or exposure on computers that are lost or stolen as well as providing protection for removable drives such as USB flash drives and external hard drives through BitLocker To Go.

Security Fundamentals LESSON 2.5_A BitLocker ToGo Video  In Windows ® 7, core BitLocker drive encryption functionality is enhanced to deliver an improved experience for IT professionals and end users.  Includes simple enhancements such as the ability to right-click on a drive to enable BitLocker protection and the automatic creation of the required hidden boot partition.  Learn about these enhancements and the new BitLocker To Go, which gives system administrators control over how removable storage devices can be used and the strength of protection required.  Watch the video. Watch the video.

Security Fundamentals LESSON 2.5_A BitLocker ToGo Recovery Key  Required if the encrypted drive is moved to another computer or changes are made to the system startup information  Is so important that it is recommended that you make additional copies of the key and store the key in safe places so that you can readily find the key if needed to recover access to the drive  Need the recovery key to unlock the encrypted data on the drive if BitLocker enters a locked state  Is unique to this particular drive; cannot use it to recover encrypted data from any other BitLocker-protected drive.  For maximum security, store recovery keys apart from the computer

Security Fundamentals LESSON 2.5_A Trusted Platform Module (TPM)  A TPM is a microchip designed to provide basic security-related functions, primarily involving encryption keys.  The TPM is usually installed on the motherboard of a computer or laptop and communicates with the system using a hardware bus.  After the TPM is initialized, the BitLocker setup wizard prompts you to choose how to store the recovery key. You can choose from the following options: o Save the recovery key to a USB flash drive. Saves the recovery key to a USB flash drive. o Save the recovery key to a file. Saves the recovery key to a network drive or other location. o Print the recovery key. Prints the recovery key.

Security Fundamentals LESSON 2.5_A Mail Encryption & Signing S/MIME provides two security services:  Digital signatures  Message encryption  These two services are the core of S/MIME-based message security.  All other concepts related to message security support these two services.  Although the full scope of message security may seem complex, these two services are the basis of message security.  After gaining a basic understanding of digital signatures and message encryption, you can then learn how other concepts support these services.

Security Fundamentals LESSON 2.5_A Class Activity Setting up mail encryption 1. Open Outlook ® 2. Click on Tools 3. Click on Trust Center 4. Click on Security 5. Click Settings

Security Fundamentals LESSON 2.5_A Lesson Review  Summarize the importance of file and mail encryption  The encrypted file system, or EFS, was introduced in NTFS 3.0 to provide an additional level of security for files and directories. o It provides cryptographic protection of individual files on NTFS file system volumes using a public-key system.  Typically, the access control to file and directory objects provided by the Windows security model is sufficient to protect unauthorized access to sensitive information. o However, if a laptop that contains sensitive data is lost or stolen, the security protection of that data may be compromised. o Encrypting the files increases security.