Securing . (with extra benefits) Helen George Jeremy George Nexus Resources, Inc. 1
|
|
- Tracy Walters
- 8 years ago
- Views:
Transcription
1 Securing (with extra benefits) Helen George Jeremy George 2009 Nexus Resources, Inc. 1
2 Access Transmission Storage Nexus Resources, Inc. 2
3 Access Transmission Storage Nexus Resources, Inc. 3
4 Roadmap 1 Software choices 2 during transmission 3 and files in storage 4 Encryption Nexus Resources, Inc. 4
5 Some choices for Microsoft Outlook 2007 (uses 3DES by default) MacOS X PGP.com VPN Nexus Resources, Inc. 5
6 VPNs are a special case VPNs are to -> as PGP/Mime is to -> Nexus Resources, Inc. 6
7 Some choices for storage Bitlocker by Microsoft Filevault by Apple Dm-crypt for Linux TrueCrypt is quasi open source PGP.com Nexus Resources, Inc. 7
8 What software to use? I use PGP.com s products because I trust them, because they solve both transmission and storage problems and because they are reasonably transparent when installed correctly. A perpetual license is $99 for a single user stand-alone version. Nexus Resources, Inc. 8
9 Transmission Nexus Resources, Inc. 9
10 Some examples Nexus Resources, Inc. 10
11 Some examples Nexus Resources, Inc. 11
12 Some examples Nexus Resources, Inc. 12
13 Some examples Nexus Resources, Inc. 13
14 The Notifier Nexus Resources, Inc. 14
15 Storage Nexus Resources, Inc. 15
16 Some examples Nexus Resources, Inc. 16
17 Some examples Nexus Resources, Inc. 17
18 Some examples Nexus Resources, Inc. 18
19 Some examples Nexus Resources, Inc. 19
20 Secure Outlook data file Nexus Resources, Inc. 20
21 Looks like this Nexus Resources, Inc. 21
22 A caution A virtual disk is a file that can be deleted. Nexus Resources, Inc. 22
23 Encryption Nexus Resources, Inc. 23
24 Yikes MEGO! Most of the complexity of encryption is hidden from you. The user s primary tasks are to choose a good passphrase, protect it carefully and actually use the encryption. Nexus Resources, Inc. 24
25 Clear Text To: Subject: test\r\n Date: Thu, 6 Aug :20: \r\n Content-Type: text/plain;\r\n charset="us-ascii"\r\n Content-Transfer-Encoding: 7bit\r\n Now is the time for all good men to come to the aid of their country. The quick brown fox jumped over the lazy dog.\r\n. Nexus Resources, Inc. 25
26 Cypher Text To: "'Jeremy George'" Subject: [PGP] test\r\n Date: Thu, 6 Aug :44: \r\n Content-Type: multipart/encrypted;\r\n protocol="application/pgp-encrypted"\r\n -----BEGIN PGP MESSAGE-----\r\n Version: PGP Desktop (Build 500)\r\n qanqr1dbwewdvukt44zvt2ybb/4kb+tr+qebwr0u57ezkdace8/jdrku05cdpvfj\r\n KY4Gu3oM/Idfiq3QODXT2rpKDAyX52SFJDChDk9Gk/LB77XIEsTUcDvcsF4S5fGu\r\n Kt3ggo9DsjB9cDJTeGXsRmty+f3Q+05fn2i7JT4659Rg07ZIoM9x/xUJ5WEEv0Lu\r\n mt7ztfkj9jimq+en3tsv8rrum/v2hiurzrkqvr7gl9fa5yjooeukugpzyxbph75i\r\n fkj9jimq+en3tsv8rrum/v2hiurzrkqvr7gl9fa5yjooeukugpzyxbph75i Nexus Resources, Inc. 26
27 Received Text * PGP Signed: 08/12/09 at 14:25:50, Decrypted Now is the time for all good men to come to the aid of their country. The quick brown fox jumped over the lazy dog. * Jeremy George <jeremy@georgeco.us> * 0x7769BCAD Nexus Resources, Inc. 27
28 Public key/private key Nexus Resources, Inc. 28
29 Public key/private key The public key is distributed widely. It is used to encrypt messages that only you can decrypt with your private key. The public key is also used to decrypt messages encrypted with your private key. Nexus Resources, Inc. 29
30 Public key/private key The private key is not distributed. It is used to decrypt messages encrypted with your public key. The private key is also used to encrypt messages that can only be decrypted with your public key. Nexus Resources, Inc. 30
31 Encrypt with a recipient s public key Clear text Nexus Resources, Inc. 31
32 Encrypt with a recipient s public key Cypher text Nexus Resources, Inc. 32
33 Decrypt with a recipient s private key Cypher text Nexus Resources, Inc. 33
34 Decrypt with a recipient s private key Clear text Nexus Resources, Inc. 34
35 Encrypt with my private key Clear text Nexus Resources, Inc. 35
36 Encrypt with my private key Cypher text Nexus Resources, Inc. 36
37 Decrypt with my public key Cypher text Nexus Resources, Inc. 37
38 Decrypt with my public key Clear text Nexus Resources, Inc. 38
39 What does a PGP key look like? -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP Desktop (Build 500) mqenbep6nfqbcac9ozachz/vompntknpdesf8u/ptd4q2s3goena4od6jid+n7r7uqnqp4jh46tj9ha4u8agnlrgrwwslyk 3Ybk4ioSzLk2/BhbfU0Fl264MajF3u8DD1h5ddioCL8F2wwdocItCfiJN9ZfXiqi4DZX03lujpE4Rv11KPqtUcZ54h6IWwe8BZGmsrUebllnt6i0qC cinb/0ceqpmx/znsbvp5gw1gleoy8/sgwadtxn1f3e+t9pxb8qi88qtbqgiu5bsiepwdzf8llqs5etlthkgal8a2smpu6uixrbfar9vcdtvh gngm49dfb2oh4cewfckvuzne/n43//x/gel0rrxabebaag0ikplcmvtesbhzw9yz2ugpgplcmvteubnzw9yz2vjby51cz6jaw0eeaec AFcFAkp6nFQwFIAAAAAAIAAHcHJlZmVycmVkLWVtYWlsLWVuY29kaW5nQHBncC5jb21wZ3BtaW1lBwsJCAcDAgoCGQEFGwMAAA ADFgIBBR4BAAAABBUICQoACgkQNxIrbHdpvK3WlQf+P2OyrQYon7OfWJ3fMF4S3kMBRRHUyQ2aEjsotbXLFN51JQJiHNfsJj7bosiHQ D7Wi0qgDrupeYXi6ZUrgOJ7JmCIJ9z5ZWLTjUD4I5nEXiAdoJnyncr+RD2xVTGuk0TuMn2M/M2/zCeKK3HV4jVMHEUY41VgyvAJNs9L e8bhamt1wnwa/xkc5mqinuoheoxp8b624d8wlispodmsbyhfb0x2sak27a+w3nzzy2dsrmyr+r1z2vl3p/qaajcy3zpdgcktm6uorld N4xyaVQmtWkxRiW+M+FATWIUSf6Fe/PvXeHDZJDsZjTUHhIaxnsUQTPm7842IoxO2GlREMm9p67kBDQRKepxUAQgAwRa99TXObV cyzsjsdpzap06rrwg8rooaghw7by1wxa1kzwfynmgyuvikrycuyp2fugkawtoyfquaq381stcca1rsobjf9fzj9qv1u3shts20tz+nl8sqi e0belrwmqa4skgfblivnlzv7tfedwak4ag9rbfw0hnwdbdhdyi87vl/bymvgpu9oubxiu8zohdrnw1kirdrihrsj35b0p2403v14ipchjdu OlKV2N8BTCLWlIJ7FfKNWHSyMkwH3EA7BDwkNtNvs/seXQC3knM5ZZ3uHxjPg/cXO3GhR1RiY2NHnjxc9JuULoKWmYWjmgOX0M N0Cw87CrOu7nx3rM5HGwARAQABiQJBBBgBAgErBQJKepxVBRsMAAAAwF0gBBkBCAAGBQJKepxUAAoJEFVCreOGVU9mM6YH/0l Oa9gu1IClAW6oMReEuVTgWh8EGiCj14ZiN5Xo4Rs0y56nCFK+u1xbsqX0Yj/Lr+mcrLeE0iLUW2H51ZE3gl5hVdJPbr3hkz/Ym633tbkTSG Gz/YVHcM0URi2BQ7ExCDMecIGREqDL1rBpVrwJIEU/fe/8LhkusU04Ke/8mFtwjowXhayZL4Yvv8dDCvQngyJ6ZZXjhrkdgusOTtPMlPa 9Aajgp1V4nXTCF4mLINqWpcfT9h92jebP0xANHXpQ9UaDLzLlb1o9JFGnLqUm26wvnnFSuqwdyps/4gNvmPV4QlPQL/Zz9Wx6LryAm3d tazaye/btzhrxf8wb8cmilq4acgkqnxirbhdpvk0wsqgamzoccl/hblrwoa3sjfzwfcjf5hgwjmwumt+mwv8tjpw7gjmxnhr75xvloq uphutpqjjhzzdrg0dbiipb9marljbycyfg0wcd/lb9qbxmunmwycodlf0y7esux5hd9yz1wbrvvbm/dv4gm5tcpuyva1m/ctqwa++v4jqw 4+PkvyfsxoiQDNAuynE507FAAtfTGpkY1kxMjFoV8FyodLL92OuI+RAFOuqFU+w215PttbK71ldAwK8EZFYO1neaPhuNCpmtK26qNT5rI S3UPxiouWI+R7G30E2/2SniuUkzu4WZ3CMXvRmuWSKXcQw24aJX6PfMqNOBPbGy4EWN6F/mjw== =u/1o -----END PGP PUBLIC KEY BLOCK----- Nexus Resources, Inc. 39
40 Where do I get keys? You use software that asks you to enter a passphrase for your private key. It then transforms that passphrase mathematically into some number of bits (today it s typically 2048 [2**11]). Your public key is in turn mathematically created from your private key and related to it. But, they are two different keys. Nexus Resources, Inc. 40
41 Why isn t encryption used everywhere? 1. It isn t free. 2. It takes effort. 3. You need to build a web of trust. 4. For many people there is no motive. You should be able to answer the question: Why bother? Nexus Resources, Inc. 41
42 Web of trust? A limitation of public key/private key encryption is the difficulty of verified key exchange. How can I be sure that the key I ve just been sent is actually your public key? There are ways. Trusted key servers. Key exchange parties. Public key/private key encryption works best in well-defined groups. Nexus Resources, Inc. 42
43 What is a good passphrase? One that is difficult to guess, but easy to remember. So, Xym4O0ll^%GWbp@$ would be difficult to guess, but a nightmare to remember. Jeremy would be easy for me to remember, but trivial to guess. Nexus Resources, Inc. 43
44 What is a good passphrase? One technique is to use the first letter of song titles. Raindrops Keep Falling on my Head, They Keep Falling becomes RKFomH,69TKF. Pretty hard to guess, but still reasonably easier to remember. Lots of other possibilites. Nexus Resources, Inc. 44
45 Another caution Kevin Mitnick s The Art of Deception describes the best way to gain access to confidential information be charming. A kind heart is the weakest security link. Nexus Resources, Inc. 45
46 TANSTAAFL Helen George Jeremy George 203 / Nexus Resources, Inc. 46
Yale Software Library. PGP 9.6 for Windows
PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search
More informationSecure Email User Guide. PGP (Pretty Good Privacy)
Secure Email User Guide PGP (Pretty Good Privacy) 1 Contents 1 Introduction... 3 2 PGP Web Messenger... 4 3 Enrolling as a PGP Web Messenger User... 4 4 How to use PGP Web Messenger... 6 4.1 Mailbox access...
More informationIntroduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com)
Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com) This practice examination consists of questions based on the most common Windows 7 features. As a professional,
More informationSecure Email User Guide
Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...
More informationEncrypting your Email Communications using PGP
Encrypting your Email Communications using PGP If you are watching this tutorial as part of the conference materials, the software is on a separate CD. Alternately, you can obtain the software at the following
More informationGuidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
More informationEveryday Cryptography
Everyday Cryptography Michael F. Herbst michael.herbst@iwr.uni-heidelberg.de http://blog.mfhs.eu Interdisziplinäres Zentrum für wissenschaftliches Rechnen Ruprecht-Karls-Universität Heidelberg 24 November
More informationStoring and securing your data
Storing and securing your data Research Data Management Support Services UK Data Service University of Essex April 2014 Overview Looking after research data for the longer-term and protecting them from
More informationAn Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst
An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity
More informationStoring and securing your data
Storing and securing your data Veerle Van den Eynden UK Data Service Advanced training course Managing and sharing your research data 18-19 June 2015 Overview Looking after research data for the longer-term
More informationPGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
More informationUsing Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the
More informationConcepts in Crypto. Parker Higgins parker@eff.org @xor. Micah Lee micah@eff.org @micahflee PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709
Concepts in Crypto Parker Higgins parker@eff.org @xor PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709 Micah Lee micah@eff.org @micahflee PGP: 5C17 6163 61BD 9F92 422A C08B B4D2 5A1E 9999 9697 Who
More informationStorage, backup, transfer, encryption of data
Storage, backup, transfer, encryption of data Veerle Van den Eynden UK Data Archive Looking after your research data: practical data management for research projects 5 May 2015 Overview Looking after research
More information4. Click Next and then fill in your Name and E-mail address. Click Next again.
NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to
More informationChapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
More informationPGP Desktop Email Quick Start Guide Version 10.2
PGP Desktop Email Quick Start Guide Version 10.2 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. Use PGP Desktop Email to: Automatically and transparently encrypt,
More informationSecuring Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
More informationPGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1
PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4
More informationWakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
More informationMobile Device Security and Encryption Standard and Guidelines
Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile
More informationEncryption Made Simple for Lawyers
Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important
More informationReceiving Secure Email from Citi For External Customers and Business Partners
Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure
More informationUsing your Encrypted BlackBerry
Using your Encrypted BlackBerry How do I change the Language on my BlackBerry? 1. On the Home screen or in a folder, click the Options icon. 2. Click Typing and Input > Language. 3. To change the display
More informationSubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
More informationVirtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
More informationCBH Provider EDI Browser Manual
CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions
More informationGPG - GNU Privacy Guard
GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly
More informationIBM Lotus Protector for Mail Encryption
IBM Lotus Protector for Mail Encryption Server Upgrade Guide 2.1.1 Version Information Lotus Protector for Mail Encryption Server Upgrade Guide. Lotus Protector for Mail Encryption Server Version 2.1.1.
More informationPersonal Secure Email Certificate
Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationSecure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
More information( ://.. / ) ( ://. / )
How to encrypt (almost) anything PCWorld 1 of 5 ( ://.. / ) ( ://. / ) @atcastle Jan 18, 2013 3:30 AM SINGLE PAGE (?PAGE=0) Your email messages can contain some very sensitive information, which makes
More informationPGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?
More information1 of 8 3/7/2014 8:38 AM
1 of 8 3/7/2014 8:38 AM @atcastle Jan 18, 2013 3:30 AM SINGLE PAGE (?PAGE=0) Your email messages can contain some very sensitive information, which makes them a prime candidate for encryption. If you use
More informationEncryption. Introduction to using 7-Zip
IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff
More informationHMRC Secure Electronic Transfer (SET)
HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government
More informationPENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.
Social Sciences Computing a division of File Security John Marcotte Director of February 2008 File Security Review security issues Overview of encryption Software Data Security Plan Questions Reasons for
More informationINFORMATION SECURITY GUIDELINE How to Encrypt Files Using Common Applications Revision 1.1
INFORMATION SECURITY GUIDELINE How to Encrypt Files Using Common Applications Revision 1.1 Contents Introduction... 1 Safely Delivering the Encryption Password to the Recipient... 2 How to Encrypt Files
More informationACS Email Encryption Recipient Guide
ACS Email Encryption Recipient Guide ACS ENCRYPTION SERVICES / TRAINING AND AWARENESS ACS Email Encryption Recipient Guide Email Encryption Recipient Guide ACS A Xerox Company 2828 North Haskell Dallas,
More informationSecure Client Applications
Secure Client Applications Networking Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 26 June 2014 Common/Reports/secure-client-apps.tex, r900 1/26 Acronyms
More informationEncrypted File Systems. Don Porter CSE 506
Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue
More informationSWFP: Secure Web Feed Protocol
SWFP: Secure Web Feed Protocol Frédérick Giasson fred [at] fgiasson.com Abstract SWFP ensures the secure broadcasting of web feeds content over a local network or the Internet. The protocol is built to
More informationAcer edatasecurity Management
1 Acer edatasecurity Management By applying the most advanced cryptographic technologies, Acer edatasecurity Management offers Acer PC users greater personal data security and encryption for files and
More informationOffice Standardization. E-Mail Encryption Gateway. A Brief Guide for External Communication Partners.
Office Standardization. E-Mail Encryption Gateway. A Brief Guide for External Communication Partners. 1 A Brief Description of the Solution. All employees of Deutsche Telekom can use the E-Mail Encryption
More informationDSHS CA Security For Providers
DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public
More informationPGP Universal Satellite Version 2.7 for Windows Release Notes
PGP Universal Satellite Version 2.7 for Windows Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Universal
More informationData storage, collaboration, backup, transfer and encryption
Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and
More informationPayFlex FTP - Wired Commute
PayFlex FTP - Wired Commute What is FTP? FTP stands for File Transfer Protocol. PayFlex uses FTP to send and receive files from our clients. We do so through a secure website that uses PGP encryption to
More informationEncryption: Ensuring Information Security
Encryption: Ensuring Information Security Colin Chisholm CISSP, GCIH Information Security Analyst Associate Information Security & Systems / Compliance cchisholm@northwestern.edu Agenda Encryption - Explanation
More informationCOMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG
COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG INTRODUCTION My Background Some questions for you Why computer security? Principle of Incarnation What this presentation covers (and
More informationSymantec File Share Encryption Quick Start Guide Version 10.3
Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share
More informationSecureZIP User Guide
SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform
More informationSymantec Encryption Solutions for Email, Powered by PGP Technology
Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman
More informationDigital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
More informationHow do I see an encrypted INCISIVE MD email for the first time?
CrossCurrent, Inc. 5331 SW Macadam Ave, Suite 216 Portland, Oregon 97239 How do I see an encrypted INCISIVE MD email for the first time? Summary With the release of INCISIVE MD 5.2, emails sent to email
More informationHow to Password Protect Files & Folders in Mac OS X with Disk Images
The best way to secure sensitive information from malware is to encrypt it. Encryption works by using a complex formula to securely scramble (or encrypt) individual files and folders, entire disks and
More informationIBM Lotus Protector for Mail Encryption. User's Guide
IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This
More informationFile and email encryption with GPG4win & Enigmail
Protektor Services Windows Manual 11.5 File and email encryption with GPG4win & Enigmail Introduction, Contact, Legals, License Introduction Protektor Services Manual version 11.5 A new edition of the
More informationExam Papers Encryption Project PGP Universal Server Trial Progress Report
Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well
More informationSterling Integrator. PGP Server Manager 5.1
Sterling Integrator 5.1 Contents Overview of...3 Create a PGP Server Profile...3 Edit a PGP Server Profile...5 Delete a PGP Server Profile...5 2 Overview of The enables you to add, edit, and delete PGP
More informationNetwork Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
More informationCritical Data Guide. A guide to handling critical information at Indiana University
Critical Data Guide A guide to handling critical information at Indiana University What is critical information? IU defines critical information as sensitive data requiring the highest level of protection.
More informationThe Surveillance State and what to do about it
The Surveillance State and what to do about it Steve Revilak https://masspirates.org/ Boston Anarchist Bookfair Nov 21, 2015 1 / 29 First Principles surveillance (n) Close observation of a person or group,
More informationPGP Product Update Juha Ropponen
PGP Product Update Juha Ropponen Arrow ECS Finland Oy 1 Symantec Encryption tuoteperhe uudet nimet PGP Universal Server = Encryption Management Server Whole Disk Encryption = Drive Encryption Netshare
More informationWindows Symantec Encryption Desktop (PGP) Install Guide. Symantec Encryption Desktop (PGP) Windows system requirements
Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > Windows Symantec Encryption Desktop (PGP) Install Guide
More informationEncryption and Digital Signatures
GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/
More informationHoneywell Secure Email External User Guide August 2013
Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to
More informationPGP Desktop for Mac OS X Quick Start Guide Version 10.0
PGP Desktop for Mac OS X Quick Start Guide Version 10.0 What is PGP Desktop? PGP Desktop provides comprehensive security for desktops and laptops, making it possible for enterprises, workgroups, and individuals
More informationWhy Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
More informationSymantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes
Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this
More information2007-05-19. Advice, Organization, & Compilation 2000-2003 Eric L. Howes (eburger68@myrealbox.com)
2007-05-19 The information in this file was obtained from the internet and we attribute according to the attribution that appeared on the bottom of the page at that time. Advice, Organization, & Compilation
More informationHEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team
How To Communicate with the HIS Project Team This guide is intended to provide you with support for communicating with the HIS Project Team. There may be instances where the HIS Project Team will require
More informationAcceptable Encryption Usage for UTHSC
This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged
More information1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
More informationE-Mail security. Mag. iur. Dr. techn. Michael Sonntag
Mag. iur. Dr. techn. Michael Sonntag E-Mail security E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology
More informationSetting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
More informationYale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for
More informationProblem. Solution. Quatrix is professional, secure and easy to use file sharing.
Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities
More informationPDG Software. Keyman Encryption Guide
Keyman Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership
More informationPGP Whole Disk Encryption Quick Start Guide Version 9.8
PGP Whole Disk Encryption Quick Start Guide Version 9.8 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect your data
More informationAcer edatasecurity Management
1 Acer edatasecurity Management Acer edatasecurity Management offers you greater personal data security and encryption for files and data transmitted via instant messaging or email. It supports the Personal
More informationInternet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
More informationLearning how OpenPGP works and how to use it to manage your keyring has just been a warm-up to the real meat of this book: using OpenPGP with email.
8 O P E N P G P A N D E M A I L Learning how OpenPGP works and how to use it to manage your keyring has just been a warm-up to the real meat of this book: using OpenPGP with email. Both PGP and GnuPG extend
More informationCryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
More informationGPG installation and configuration
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
More informationHow to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application
How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application In order to ensure Personal Health Information (PHI) and Personally Identifiable Information (PII) is protected, KDADS
More informationEncryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
More informationINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
More informationTutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)
Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.
More informationDepartmental (Service) Account Set Up
Departmental (Service) Account Set Up Exchange does not offer an exact equivalent to GroupWise proxy. Listed below are different methods of accessing your departmental or service account. All require that
More informationHow To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)
EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...
More informationOptions for encrypted e-mail communication with AUDI AG Version of: 31 May 2011
Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form
More informationKeep Hackers Guessing: Protecting Corporate Information While On The Go
Keep Hackers Guessing: Protecting Corporate Information While On The Go Proactive tips for wireless information security for traveling professionals. In today s world where WiFi hotspots are available
More information31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
More information1. Our staff would like to exchange files with outside parties (clients, attorneys) using a web service (such as Dropbox ). Is this safe?
1. Our staff would like to exchange files with outside parties (clients, attorneys) using a web service (such as Dropbox ). Is this safe? The key is to do your "due diligence. Make sure that you fully
More informationHOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE
HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client
More informationIBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
More informationEncrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010
Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data
More informationWhitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
More information