300 likes | 594 Vues
Cyber Security Awareness Month. Off-Campus Safe Computing Part 1. Protecting Your Laptop’s Data. Introductions. Allen Monette Security Coordinator Office of Campus Information Security. Why are we here?. OCIS Brown Bag Series. Worst Practices, or 10 Easy Steps to Loosing Your Data
E N D
Cyber Security Awareness Month Off-Campus Safe Computing Part 1 Protecting Your Laptop’s Data
Introductions Allen Monette Security Coordinator Office of Campus Information Security
OCIS Brown Bag Series • Worst Practices, or 10 Easy Steps to Loosing Your Data • Protecting Your Laptop’s Data • Using Your Laptop Safely on the Road • Finding and Protecting Sensitive Data on Your Computer • Protecting Data by Using Network and Server Scanning Tools
Effective Practices for Restricted Data HandlingRisk Reduction Strategy Risk Assessment Risk Reduction Strategies OR THEN OR
It’s 3am… Do you know where your laptops are? Full Disk Encryption protects against lost devices
Would you trust… this guy with your files? File and Folder Encryption protects specific data
File encryption Think of file encryption as a secret code A simple code: A=0 B=1 C=2 D=3 Etc A message: 7 4 11 11 14 22 14 17 11 3
Folder encryption Think of folder encryption as a safe deposit box
Full Disk Encryption Think of Full Disk Encryption like a bank vault
File and folder Encryption Encrypts individual files or entire folders Requires authentication to decrypt and access the files
Full Disk Encryption Replaces the master boot record with a special pre-boot environment Encrypts the entire hard drive Preboot Authentication plus OS authentication Decrypts as files are used
When to use Full Disk Encryption Full Disk Encryption protects against lost devices
When to use file/folder Need an additional layer of security Need portability Need to support removable media
Laptop/Desktop Encryption Project Full disk and file/folder encryption for PC Mac
Where are we now? • Installed on about 250 computers • Registrar’s office, Financial Aid, Admissions, and UW Survey Center are leading the pack on installs • UW Milwaukee purchasing their own licenses and running their own server • Ready for more participants
How can I get Involved? Email Allen Monette amonette@wisc.edu Or Linda Pruss pruss@doit.wisc.edu