Presentation is loading. Please wait.

Presentation is loading. Please wait.

ENCRYPTION Coffee Hour for August 2014. HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.

Similar presentations


Presentation on theme: "ENCRYPTION Coffee Hour for August 2014. HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message."— Presentation transcript:

1 ENCRYPTION Coffee Hour for August 2014

2 HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message Caesar cipher – encrypted communications by substituting one letter for another, usually a shift of 3 letters in the alphabet Enigma Machine – Sophisticated for its time, allowed Germans to encypt communications during World War II, used rotors to substitute characters

3 WHAT IS ENCRYPTION? Encryption uses complex mathematical formulas to take plain text and turn it in to cipher text Example: Plain Text: Coffee Hours are great! Encryption happens… Cipher Text: jusklad nasdl ksd hd;klq Cipher text can’t be read unless you have the “key” that will turn it back into plain text Keys can be passwords, PINs, even smart cards

4 WHY SHOULD I ENCRYPT? Encryption ensures confidentiality Its all about keeping your private files, private Its simple to do, in fact you use it without even realizing it when you shop online or use your bank’s customer portal

5 TYPES OF ENCRYPTION Data at rest Full Disk Encryption (FDE) This has to be turned on, it is not on by default in most operating systems Protects the contents of your entire drive Data in motion Secure Sockets Layer (SSL) This happens behind the scenes. When you are on a banking or retail site and you see https:// or the padlock icon, it means that SSL is being used to encrypt your data. You don’t have to do anything to get this to work. Your computer and the organization’s server work out the details on their own

6 BITLOCKER Bitlocker provides full disk encryption for Microsoft Windows systems It relies on a chip (TPM) on the motherboard, which stores the encryption key. Save your recovery key in a safe place like an external hard drive, flash drive or CD. If Bitlocker detects any errors (disk errors, change to BIOS, changes to startup files) you will need to enter the recovery key to regain access to your files It is available in these versions of Windows: Windows Vista Windows 7 Ultimate Windows 7 Enterprise Windows 8.1 Pro Windows 8.1 Enterprise

7 HOW TO TURN ON BITLOCKER Be sure that you are connected to a reliable power source Go to Start  Control Panel  System and Security Click on Bitlocker Drive Protection Click Turn On Bitlocker – This opens the Bitlocker Setup wizard. Follow the instructions in the wizard Your computer will be restarted, then Bitlocker will begin encrypting the drive

8 FILEVAULT FileVault provides full disk encryption for Mac OSX operating systems It is available on Mac OSX Lion (10.7) or later and you must have a recovery drive on your system (You can get to this by holding command + r while your Mac boots) All user accounts must have a password set When enabling FileVault, you are given a recovery key. Save this in a safe place. If you forget your password, this is the only way for you to get in to your system Apple provides storage of your recovery key in iCloud. You will have to set up 3 security questions. You must be able to give the exact answer, they are case sensitive. This is a great backup in case you lose the key and you forget your password. Note: You do need to have an iCloud account for this to work.

9 HOW TO TURN ON FILEVAULT Be sure that you are connected to a reliable power source Go to System Preferences  Security and Privacy Click on the FileVault tab Choose “Enable FileVault” (If this option is grayed out you may need to click on the padlock to make the change) If there are more than one user accounts, you will be asked which accounts may be used to access the encrypted drive. You will need to enter the password for each of the accounts You will be shown your recovery key next. Make a copy of this key. You can store it with Apple as well You will now be prompted to restart your Mac. When it comes back up it will begin encrypting the drive

10 IPHONES/IPADS (IOS) Encryption available for: iPhone 3GS and later All iPad models iPod Touch (3 rd generation or later) Apple refers to this as data protection Data protection is enabled when you set a passcode on your Apple iOS device

11 HOW TO TURN ON DATA PROTECTION Tap Settings  General  Passcode Follow the prompts to create a passcode After the passcode is set, scroll down to the bottom of the screen and verify that “Data protection is enabled” is visible Passcode Tips Set require passcode immediately Disable simple passcode to use longer, alphanumeric passcodes Enable erase data to automatically erase the device after ten failed passcode attempts

12 ANDROID Encryption can cause some slowness because of the overhead on the system The initial encryption time varies but is usually about an hour. Don’t interrupt this process. Encryption is irreversible on Androids. The only way to remove it is to perform a factory reset, which also wipes your device’s data. To access your Android once you have encrypted it, simply type in your password

13 HOW TO ENCRYPT YOUR ANDROID Note: Menus may vary by manufacturer Ensure that you are connected to a reliable power source Set a PIN or password for the lock screen Go to Settings  Security and select Encrypt Phone or Encrypt Tablet (The encryption menu may move around, for instance it is under the Storage menu on some HTC devices) Press the Encrypt button at the bottom

14 HOW TO ENCRYPT YOUR ANDROID You may also use 3 rd party apps to encrypt your phone rather than the native feature in the Android operating system Some favorites include: SSE – Universal Encryption App (free) Encryption Manager (around $4) NOTE: Some Sony phones do not have the native encryption feature so you would need to use a 3 rd party app like those above


Download ppt "ENCRYPTION Coffee Hour for August 2014. HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message."

Similar presentations


Ads by Google