Download presentation
Presentation is loading. Please wait.
Published byNatalie Pitts Modified over 9 years ago
1
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1
2
Introductions Allen Monette Security Coordinator Office of Campus Information Security
3
Why are we here?
5
OCIS Brown Bag Series Worst Practices, or 10 Easy Steps to Loosing Your Data Protecting Your Laptop’s Data Using Your Laptop Safely on the Road Finding and Protecting Sensitive Data on Your Computer Protecting Data by Using Network and Server Scanning Tools
6
Effective Practices for Restricted Data Handling Risk Reduction Strategy Find It: Determine if you store or process restricted data. Are you at Risk? Delete It: If there is no business need for storing restricted data, securely delete it. Remove Risk Move It: If there is a business need for storing restricted data, move the data to a secure server for proper storage and handling. Transfer Risk Encrypt It: If there is a business need to store restricted data, encrypt the data. (Desktop Encryption) Mitigate Risk OR THEN Risk Reduction Strategies Risk Assessment
7
Why Encryption?
8
It’s 3am … Do you know where your laptops are? Full Disk Encryption protects against lost devices
9
Would you trust… this guy with your files? File and Folder Encryption protects specific data
10
How does it work?
11
File encryption Think of file encryption as a secret code A simple code: A=0 B=1 C=2 D=3 Etc A message: 7 4 11 11 14 22 14 17 11 3
12
Folder encryption Think of folder encryption as a safe deposit box
13
Full Disk Encryption Think of Full Disk Encryption like a bank vault
14
How does it really work?
15
File and folder Encryption Encrypts individual files or entire folders Requires authentication to decrypt and access the files
16
Full Disk Encryption Replaces the master boot record with a special pre- boot environment Encrypts the entire hard drive Preboot Authentication plus OS authentication Decrypts as files are used
17
How to choose between Full Disk and File/Folder?
18
When to use Full Disk Encryption Full Disk Encryption protects against lost devices
19
When to use file/folder Need an additional layer of security Need portability Need to support removable media
20
What is UW Madison doing?
21
Laptop/Desktop Encryption Project Full disk and file/folder encryption for PC Mac
22
Nice if you can get it
23
Product Selected
25
Where are we now? Installed on about 250 computers Registrar’s office, Financial Aid, Admissions, and UW Survey Center are leading the pack on installs UW Milwaukee purchasing their own licenses and running their own server Ready for more participants
26
How can I get Involved? Email Allen Monette amonette@wisc.edu Or Linda Pruss pruss@doit.wisc.edu
27
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.