1 / 27

Cyber Security Awareness Month

Cyber Security Awareness Month. Off-Campus Safe Computing Part 1. Protecting Your Laptop’s Data. Introductions. Allen Monette Security Coordinator Office of Campus Information Security. Why are we here?. OCIS Brown Bag Series. Worst Practices, or 10 Easy Steps to Loosing Your Data

shalin
Download Presentation

Cyber Security Awareness Month

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cyber Security Awareness Month Off-Campus Safe Computing Part 1 Protecting Your Laptop’s Data

  2. Introductions Allen Monette Security Coordinator Office of Campus Information Security

  3. Why are we here?

  4. OCIS Brown Bag Series • Worst Practices, or 10 Easy Steps to Loosing Your Data • Protecting Your Laptop’s Data • Using Your Laptop Safely on the Road • Finding and Protecting Sensitive Data on Your Computer • Protecting Data by Using Network and Server Scanning Tools

  5. Effective Practices for Restricted Data HandlingRisk Reduction Strategy Risk Assessment Risk Reduction Strategies OR THEN OR

  6. Why Encryption?

  7. It’s 3am… Do you know where your laptops are? Full Disk Encryption protects against lost devices

  8. Would you trust… this guy with your files? File and Folder Encryption protects specific data

  9. How does it work?

  10. File encryption Think of file encryption as a secret code A simple code: A=0 B=1 C=2 D=3 Etc A message: 7 4 11 11 14 22 14 17 11 3

  11. Folder encryption Think of folder encryption as a safe deposit box

  12. Full Disk Encryption Think of Full Disk Encryption like a bank vault

  13. How does it really work?

  14. File and folder Encryption Encrypts individual files or entire folders Requires authentication to decrypt and access the files

  15. Full Disk Encryption Replaces the master boot record with a special pre-boot environment Encrypts the entire hard drive Preboot Authentication plus OS authentication Decrypts as files are used

  16. How to choose between Full Disk and File/Folder?

  17. When to use Full Disk Encryption Full Disk Encryption protects against lost devices

  18. When to use file/folder Need an additional layer of security Need portability Need to support removable media

  19. What is UW Madison doing?

  20. Laptop/Desktop Encryption Project Full disk and file/folder encryption for PC Mac

  21. Nice if you can get it

  22. Product Selected

  23. Product Selected

  24. Where are we now? • Installed on about 250 computers • Registrar’s office, Financial Aid, Admissions, and UW Survey Center are leading the pack on installs • UW Milwaukee purchasing their own licenses and running their own server • Ready for more participants

  25. How can I get Involved? Email Allen Monette amonette@wisc.edu Or Linda Pruss pruss@doit.wisc.edu

  26. Questions?

More Related