Securing . (with extra benefits) Helen George Jeremy George Nexus Resources, Inc. 1

Size: px
Start display at page:

Download "Securing Email. (with extra benefits) Helen George Jeremy George. 2009 Nexus Resources, Inc. 1"

Transcription

1 Securing (with extra benefits) Helen George Jeremy George 2009 Nexus Resources, Inc. 1

2 Access Transmission Storage Nexus Resources, Inc. 2

3 Access Transmission Storage Nexus Resources, Inc. 3

4 Roadmap 1 Software choices 2 during transmission 3 and files in storage 4 Encryption Nexus Resources, Inc. 4

5 Some choices for Microsoft Outlook 2007 (uses 3DES by default) MacOS X PGP.com VPN Nexus Resources, Inc. 5

6 VPNs are a special case VPNs are to -> as PGP/Mime is to -> Nexus Resources, Inc. 6

7 Some choices for storage Bitlocker by Microsoft Filevault by Apple Dm-crypt for Linux TrueCrypt is quasi open source PGP.com Nexus Resources, Inc. 7

8 What software to use? I use PGP.com s products because I trust them, because they solve both transmission and storage problems and because they are reasonably transparent when installed correctly. A perpetual license is $99 for a single user stand-alone version. Nexus Resources, Inc. 8

9 Transmission Nexus Resources, Inc. 9

10 Some examples Nexus Resources, Inc. 10

11 Some examples Nexus Resources, Inc. 11

12 Some examples Nexus Resources, Inc. 12

13 Some examples Nexus Resources, Inc. 13

14 The Notifier Nexus Resources, Inc. 14

15 Storage Nexus Resources, Inc. 15

16 Some examples Nexus Resources, Inc. 16

17 Some examples Nexus Resources, Inc. 17

18 Some examples Nexus Resources, Inc. 18

19 Some examples Nexus Resources, Inc. 19

20 Secure Outlook data file Nexus Resources, Inc. 20

21 Looks like this Nexus Resources, Inc. 21

22 A caution A virtual disk is a file that can be deleted. Nexus Resources, Inc. 22

23 Encryption Nexus Resources, Inc. 23

24 Yikes MEGO! Most of the complexity of encryption is hidden from you. The user s primary tasks are to choose a good passphrase, protect it carefully and actually use the encryption. Nexus Resources, Inc. 24

25 Clear Text To: Subject: test\r\n Date: Thu, 6 Aug :20: \r\n Content-Type: text/plain;\r\n charset="us-ascii"\r\n Content-Transfer-Encoding: 7bit\r\n Now is the time for all good men to come to the aid of their country. The quick brown fox jumped over the lazy dog.\r\n. Nexus Resources, Inc. 25

26 Cypher Text To: "'Jeremy George'" Subject: [PGP] test\r\n Date: Thu, 6 Aug :44: \r\n Content-Type: multipart/encrypted;\r\n protocol="application/pgp-encrypted"\r\n -----BEGIN PGP MESSAGE-----\r\n Version: PGP Desktop (Build 500)\r\n qanqr1dbwewdvukt44zvt2ybb/4kb+tr+qebwr0u57ezkdace8/jdrku05cdpvfj\r\n KY4Gu3oM/Idfiq3QODXT2rpKDAyX52SFJDChDk9Gk/LB77XIEsTUcDvcsF4S5fGu\r\n Kt3ggo9DsjB9cDJTeGXsRmty+f3Q+05fn2i7JT4659Rg07ZIoM9x/xUJ5WEEv0Lu\r\n mt7ztfkj9jimq+en3tsv8rrum/v2hiurzrkqvr7gl9fa5yjooeukugpzyxbph75i\r\n fkj9jimq+en3tsv8rrum/v2hiurzrkqvr7gl9fa5yjooeukugpzyxbph75i Nexus Resources, Inc. 26

27 Received Text * PGP Signed: 08/12/09 at 14:25:50, Decrypted Now is the time for all good men to come to the aid of their country. The quick brown fox jumped over the lazy dog. * Jeremy George <jeremy@georgeco.us> * 0x7769BCAD Nexus Resources, Inc. 27

28 Public key/private key Nexus Resources, Inc. 28

29 Public key/private key The public key is distributed widely. It is used to encrypt messages that only you can decrypt with your private key. The public key is also used to decrypt messages encrypted with your private key. Nexus Resources, Inc. 29

30 Public key/private key The private key is not distributed. It is used to decrypt messages encrypted with your public key. The private key is also used to encrypt messages that can only be decrypted with your public key. Nexus Resources, Inc. 30

31 Encrypt with a recipient s public key Clear text Nexus Resources, Inc. 31

32 Encrypt with a recipient s public key Cypher text Nexus Resources, Inc. 32

33 Decrypt with a recipient s private key Cypher text Nexus Resources, Inc. 33

34 Decrypt with a recipient s private key Clear text Nexus Resources, Inc. 34

35 Encrypt with my private key Clear text Nexus Resources, Inc. 35

36 Encrypt with my private key Cypher text Nexus Resources, Inc. 36

37 Decrypt with my public key Cypher text Nexus Resources, Inc. 37

38 Decrypt with my public key Clear text Nexus Resources, Inc. 38

39 What does a PGP key look like? -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGP Desktop (Build 500) mqenbep6nfqbcac9ozachz/vompntknpdesf8u/ptd4q2s3goena4od6jid+n7r7uqnqp4jh46tj9ha4u8agnlrgrwwslyk 3Ybk4ioSzLk2/BhbfU0Fl264MajF3u8DD1h5ddioCL8F2wwdocItCfiJN9ZfXiqi4DZX03lujpE4Rv11KPqtUcZ54h6IWwe8BZGmsrUebllnt6i0qC cinb/0ceqpmx/znsbvp5gw1gleoy8/sgwadtxn1f3e+t9pxb8qi88qtbqgiu5bsiepwdzf8llqs5etlthkgal8a2smpu6uixrbfar9vcdtvh gngm49dfb2oh4cewfckvuzne/n43//x/gel0rrxabebaag0ikplcmvtesbhzw9yz2ugpgplcmvteubnzw9yz2vjby51cz6jaw0eeaec AFcFAkp6nFQwFIAAAAAAIAAHcHJlZmVycmVkLWVtYWlsLWVuY29kaW5nQHBncC5jb21wZ3BtaW1lBwsJCAcDAgoCGQEFGwMAAA ADFgIBBR4BAAAABBUICQoACgkQNxIrbHdpvK3WlQf+P2OyrQYon7OfWJ3fMF4S3kMBRRHUyQ2aEjsotbXLFN51JQJiHNfsJj7bosiHQ D7Wi0qgDrupeYXi6ZUrgOJ7JmCIJ9z5ZWLTjUD4I5nEXiAdoJnyncr+RD2xVTGuk0TuMn2M/M2/zCeKK3HV4jVMHEUY41VgyvAJNs9L e8bhamt1wnwa/xkc5mqinuoheoxp8b624d8wlispodmsbyhfb0x2sak27a+w3nzzy2dsrmyr+r1z2vl3p/qaajcy3zpdgcktm6uorld N4xyaVQmtWkxRiW+M+FATWIUSf6Fe/PvXeHDZJDsZjTUHhIaxnsUQTPm7842IoxO2GlREMm9p67kBDQRKepxUAQgAwRa99TXObV cyzsjsdpzap06rrwg8rooaghw7by1wxa1kzwfynmgyuvikrycuyp2fugkawtoyfquaq381stcca1rsobjf9fzj9qv1u3shts20tz+nl8sqi e0belrwmqa4skgfblivnlzv7tfedwak4ag9rbfw0hnwdbdhdyi87vl/bymvgpu9oubxiu8zohdrnw1kirdrihrsj35b0p2403v14ipchjdu OlKV2N8BTCLWlIJ7FfKNWHSyMkwH3EA7BDwkNtNvs/seXQC3knM5ZZ3uHxjPg/cXO3GhR1RiY2NHnjxc9JuULoKWmYWjmgOX0M N0Cw87CrOu7nx3rM5HGwARAQABiQJBBBgBAgErBQJKepxVBRsMAAAAwF0gBBkBCAAGBQJKepxUAAoJEFVCreOGVU9mM6YH/0l Oa9gu1IClAW6oMReEuVTgWh8EGiCj14ZiN5Xo4Rs0y56nCFK+u1xbsqX0Yj/Lr+mcrLeE0iLUW2H51ZE3gl5hVdJPbr3hkz/Ym633tbkTSG Gz/YVHcM0URi2BQ7ExCDMecIGREqDL1rBpVrwJIEU/fe/8LhkusU04Ke/8mFtwjowXhayZL4Yvv8dDCvQngyJ6ZZXjhrkdgusOTtPMlPa 9Aajgp1V4nXTCF4mLINqWpcfT9h92jebP0xANHXpQ9UaDLzLlb1o9JFGnLqUm26wvnnFSuqwdyps/4gNvmPV4QlPQL/Zz9Wx6LryAm3d tazaye/btzhrxf8wb8cmilq4acgkqnxirbhdpvk0wsqgamzoccl/hblrwoa3sjfzwfcjf5hgwjmwumt+mwv8tjpw7gjmxnhr75xvloq uphutpqjjhzzdrg0dbiipb9marljbycyfg0wcd/lb9qbxmunmwycodlf0y7esux5hd9yz1wbrvvbm/dv4gm5tcpuyva1m/ctqwa++v4jqw 4+PkvyfsxoiQDNAuynE507FAAtfTGpkY1kxMjFoV8FyodLL92OuI+RAFOuqFU+w215PttbK71ldAwK8EZFYO1neaPhuNCpmtK26qNT5rI S3UPxiouWI+R7G30E2/2SniuUkzu4WZ3CMXvRmuWSKXcQw24aJX6PfMqNOBPbGy4EWN6F/mjw== =u/1o -----END PGP PUBLIC KEY BLOCK----- Nexus Resources, Inc. 39

40 Where do I get keys? You use software that asks you to enter a passphrase for your private key. It then transforms that passphrase mathematically into some number of bits (today it s typically 2048 [2**11]). Your public key is in turn mathematically created from your private key and related to it. But, they are two different keys. Nexus Resources, Inc. 40

41 Why isn t encryption used everywhere? 1. It isn t free. 2. It takes effort. 3. You need to build a web of trust. 4. For many people there is no motive. You should be able to answer the question: Why bother? Nexus Resources, Inc. 41

42 Web of trust? A limitation of public key/private key encryption is the difficulty of verified key exchange. How can I be sure that the key I ve just been sent is actually your public key? There are ways. Trusted key servers. Key exchange parties. Public key/private key encryption works best in well-defined groups. Nexus Resources, Inc. 42

43 What is a good passphrase? One that is difficult to guess, but easy to remember. So, Xym4O0ll^%GWbp@$ would be difficult to guess, but a nightmare to remember. Jeremy would be easy for me to remember, but trivial to guess. Nexus Resources, Inc. 43

44 What is a good passphrase? One technique is to use the first letter of song titles. Raindrops Keep Falling on my Head, They Keep Falling becomes RKFomH,69TKF. Pretty hard to guess, but still reasonably easier to remember. Lots of other possibilites. Nexus Resources, Inc. 44

45 Another caution Kevin Mitnick s The Art of Deception describes the best way to gain access to confidential information be charming. A kind heart is the weakest security link. Nexus Resources, Inc. 45

46 TANSTAAFL Helen George Jeremy George 203 / Nexus Resources, Inc. 46

Yale Software Library. PGP 9.6 for Windows

Yale Software Library. PGP 9.6 for Windows PGP 9.6 for Windows How to Add keys to the All Keys key ring: 1. Run the PGP application from Start->All Programs->PGP. 2. In the PGP main application window, click on Search for keys. 3. In the Search

More information

Secure Email User Guide. PGP (Pretty Good Privacy)

Secure Email User Guide. PGP (Pretty Good Privacy) Secure Email User Guide PGP (Pretty Good Privacy) 1 Contents 1 Introduction... 3 2 PGP Web Messenger... 4 3 Enrolling as a PGP Web Messenger User... 4 4 How to use PGP Web Messenger... 6 4.1 Mailbox access...

More information

Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com)

Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com) Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com) This practice examination consists of questions based on the most common Windows 7 features. As a professional,

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...

More information

Encrypting your Email Communications using PGP

Encrypting your Email Communications using PGP Encrypting your Email Communications using PGP If you are watching this tutorial as part of the conference materials, the software is on a separate CD. Alternately, you can obtain the software at the following

More information

Guidelines on use of encryption to protect person identifiable and sensitive information

Guidelines on use of encryption to protect person identifiable and sensitive information Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted

More information

Everyday Cryptography

Everyday Cryptography Everyday Cryptography Michael F. Herbst michael.herbst@iwr.uni-heidelberg.de http://blog.mfhs.eu Interdisziplinäres Zentrum für wissenschaftliches Rechnen Ruprecht-Karls-Universität Heidelberg 24 November

More information

Storing and securing your data

Storing and securing your data Storing and securing your data Research Data Management Support Services UK Data Service University of Essex April 2014 Overview Looking after research data for the longer-term and protecting them from

More information

An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst

An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity

More information

Storing and securing your data

Storing and securing your data Storing and securing your data Veerle Van den Eynden UK Data Service Advanced training course Managing and sharing your research data 18-19 June 2015 Overview Looking after research data for the longer-term

More information

PGP Desktop Email Quick Start Guide version 9.6

PGP Desktop Email Quick Start Guide version 9.6 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages

More information

Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging

Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the

More information

Concepts in Crypto. Parker Higgins parker@eff.org @xor. Micah Lee micah@eff.org @micahflee PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709

Concepts in Crypto. Parker Higgins parker@eff.org @xor. Micah Lee micah@eff.org @micahflee PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709 Concepts in Crypto Parker Higgins parker@eff.org @xor PGP: 4FF3 AA1B D29E 1638 32DE C765 9433 5F88 9A36 7709 Micah Lee micah@eff.org @micahflee PGP: 5C17 6163 61BD 9F92 422A C08B B4D2 5A1E 9999 9697 Who

More information

Storage, backup, transfer, encryption of data

Storage, backup, transfer, encryption of data Storage, backup, transfer, encryption of data Veerle Van den Eynden UK Data Archive Looking after your research data: practical data management for research projects 5 May 2015 Overview Looking after research

More information

4. Click Next and then fill in your Name and E-mail address. Click Next again.

4. Click Next and then fill in your Name and E-mail address. Click Next again. NOTE: Before installing PGP, Word needs to be disabled as your editor in Outlook. In Outlook, go to Tools: Options: Mail Format and uncheck Use Microsoft Office Word to edit e-mail messages. Failure to

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

PGP Desktop Email Quick Start Guide Version 10.2

PGP Desktop Email Quick Start Guide Version 10.2 PGP Desktop Email Quick Start Guide Version 10.2 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. Use PGP Desktop Email to: Automatically and transparently encrypt,

More information

Securing Data at Rest ViSolve IT Security Team

Securing Data at Rest ViSolve IT Security Team Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1

More information

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1

PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 PGP Zip Self-Decrypting Archive (SDA) 5/29/2012 Version 1.1 Table of Contents 1 Self Decrypting Archives (SDA)... 1-2 2 Setting Windows to Display File Extensions... 2-3 3 Creating PGP Zip SDA... 3-4

More information

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive

More information

Mobile Device Security and Encryption Standard and Guidelines

Mobile Device Security and Encryption Standard and Guidelines Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile

More information

Encryption Made Simple for Lawyers

Encryption Made Simple for Lawyers Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

Using your Encrypted BlackBerry

Using your Encrypted BlackBerry Using your Encrypted BlackBerry How do I change the Language on my BlackBerry? 1. On the Home screen or in a folder, click the Options icon. 2. Click Typing and Input > Language. 3. To change the display

More information

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se

SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication

More information

CBH Provider EDI Browser Manual

CBH Provider EDI Browser Manual CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions

More information

GPG - GNU Privacy Guard

GPG - GNU Privacy Guard GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly

More information

IBM Lotus Protector for Mail Encryption

IBM Lotus Protector for Mail Encryption IBM Lotus Protector for Mail Encryption Server Upgrade Guide 2.1.1 Version Information Lotus Protector for Mail Encryption Server Upgrade Guide. Lotus Protector for Mail Encryption Server Version 2.1.1.

More information

Personal Secure Email Certificate

Personal Secure Email Certificate Entrust Certificate Services Personal Secure Email Certificate Enrollment Guide Date of Issue: October 2010 Copyright 2010 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

( ://.. / ) ( ://. / )

( ://.. / ) ( ://. / ) How to encrypt (almost) anything PCWorld 1 of 5 ( ://.. / ) ( ://. / ) @atcastle Jan 18, 2013 3:30 AM SINGLE PAGE (?PAGE=0) Your email messages can contain some very sensitive information, which makes

More information

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?

More information

1 of 8 3/7/2014 8:38 AM

1 of 8 3/7/2014 8:38 AM 1 of 8 3/7/2014 8:38 AM @atcastle Jan 18, 2013 3:30 AM SINGLE PAGE (?PAGE=0) Your email messages can contain some very sensitive information, which makes them a prime candidate for encryption. If you use

More information

Encryption. Introduction to using 7-Zip

Encryption. Introduction to using 7-Zip IT Services Training Guide Encryption Introduction to using 7-Zip It Services Training Team The University of Manchester email: its.training@manchester.ac.uk www.itservices.manchester.ac.uk/trainingcourses/coursesforstaff

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HMRC Secure Electronic Transfer (SET) How to use HMRC SET using PGP Desktop Version 2.0 Contents Welcome to HMRC SET 1 HMRC SET overview 2 Encrypt a file to send to HMRC 3 Upload files to the Government

More information

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC. Social Sciences Computing a division of File Security John Marcotte Director of February 2008 File Security Review security issues Overview of encryption Software Data Security Plan Questions Reasons for

More information

INFORMATION SECURITY GUIDELINE How to Encrypt Files Using Common Applications Revision 1.1

INFORMATION SECURITY GUIDELINE How to Encrypt Files Using Common Applications Revision 1.1 INFORMATION SECURITY GUIDELINE How to Encrypt Files Using Common Applications Revision 1.1 Contents Introduction... 1 Safely Delivering the Encryption Password to the Recipient... 2 How to Encrypt Files

More information

ACS Email Encryption Recipient Guide

ACS Email Encryption Recipient Guide ACS Email Encryption Recipient Guide ACS ENCRYPTION SERVICES / TRAINING AND AWARENESS ACS Email Encryption Recipient Guide Email Encryption Recipient Guide ACS A Xerox Company 2828 North Haskell Dallas,

More information

Secure Client Applications

Secure Client Applications Secure Client Applications Networking Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 26 June 2014 Common/Reports/secure-client-apps.tex, r900 1/26 Acronyms

More information

Encrypted File Systems. Don Porter CSE 506

Encrypted File Systems. Don Porter CSE 506 Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue

More information

SWFP: Secure Web Feed Protocol

SWFP: Secure Web Feed Protocol SWFP: Secure Web Feed Protocol Frédérick Giasson fred [at] fgiasson.com Abstract SWFP ensures the secure broadcasting of web feeds content over a local network or the Internet. The protocol is built to

More information

Acer edatasecurity Management

Acer edatasecurity Management 1 Acer edatasecurity Management By applying the most advanced cryptographic technologies, Acer edatasecurity Management offers Acer PC users greater personal data security and encryption for files and

More information

Office Standardization. E-Mail Encryption Gateway. A Brief Guide for External Communication Partners.

Office Standardization. E-Mail Encryption Gateway. A Brief Guide for External Communication Partners. Office Standardization. E-Mail Encryption Gateway. A Brief Guide for External Communication Partners. 1 A Brief Description of the Solution. All employees of Deutsche Telekom can use the E-Mail Encryption

More information

DSHS CA Security For Providers

DSHS CA Security For Providers DSHS CA Security For Providers Pablo F Matute DSHS Children's Information Security Officer 7/21/2015 1 Data Categories: An Overview All DSHS-owned data falls into one of four categories: Category 1 - Public

More information

PGP Universal Satellite Version 2.7 for Windows Release Notes

PGP Universal Satellite Version 2.7 for Windows Release Notes PGP Universal Satellite Version 2.7 for Windows Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Universal

More information

Data storage, collaboration, backup, transfer and encryption

Data storage, collaboration, backup, transfer and encryption Data storage, collaboration, backup, transfer and encryption Scott Summers UK Data Archive Practical research data management 19 April 2016 Overview Looking after research data for the longer-term and

More information

PayFlex FTP - Wired Commute

PayFlex FTP - Wired Commute PayFlex FTP - Wired Commute What is FTP? FTP stands for File Transfer Protocol. PayFlex uses FTP to send and receive files from our clients. We do so through a secure website that uses PGP encryption to

More information

Encryption: Ensuring Information Security

Encryption: Ensuring Information Security Encryption: Ensuring Information Security Colin Chisholm CISSP, GCIH Information Security Analyst Associate Information Security & Systems / Compliance cchisholm@northwestern.edu Agenda Encryption - Explanation

More information

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG COMPUTER SECURITY PRINCIPLES AND PRACTICES BY COREY@MARK5MINISTRIES.ORG INTRODUCTION My Background Some questions for you Why computer security? Principle of Incarnation What this presentation covers (and

More information

Symantec File Share Encryption Quick Start Guide Version 10.3

Symantec File Share Encryption Quick Start Guide Version 10.3 Symantec File Share Encryption Quick Start Guide Version 10.3 What is Symantec File Share Encryption? Symantec File Share Encryption is a software tool that provides multiple ways to protect and share

More information

SecureZIP User Guide

SecureZIP User Guide SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform

More information

Symantec Encryption Solutions for Email, Powered by PGP Technology

Symantec Encryption Solutions for Email, Powered by PGP Technology Symantec Encryption Solutions for Email, Powered by PGP Technology Data Sheet: Encryption The Problem with Email Are you worried that users are emailing sensitive information openly? According to Osterman

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

How do I see an encrypted INCISIVE MD email for the first time?

How do I see an encrypted INCISIVE MD email for the first time? CrossCurrent, Inc. 5331 SW Macadam Ave, Suite 216 Portland, Oregon 97239 How do I see an encrypted INCISIVE MD email for the first time? Summary With the release of INCISIVE MD 5.2, emails sent to email

More information

How to Password Protect Files & Folders in Mac OS X with Disk Images

How to Password Protect Files & Folders in Mac OS X with Disk Images The best way to secure sensitive information from malware is to encrypt it. Encryption works by using a complex formula to securely scramble (or encrypt) individual files and folders, entire disks and

More information

IBM Lotus Protector for Mail Encryption. User's Guide

IBM Lotus Protector for Mail Encryption. User's Guide IBM Lotus Protector for Mail Encryption User's Guide Version Information Lotus Protector for Mail Encryption User's Guide. Lotus Protector for Mail Encryption Version 2.1.0. Released December 2010. This

More information

File and email encryption with GPG4win & Enigmail

File and email encryption with GPG4win & Enigmail Protektor Services Windows Manual 11.5 File and email encryption with GPG4win & Enigmail Introduction, Contact, Legals, License Introduction Protektor Services Manual version 11.5 A new edition of the

More information

Exam Papers Encryption Project PGP Universal Server Trial Progress Report

Exam Papers Encryption Project PGP Universal Server Trial Progress Report Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well

More information

Sterling Integrator. PGP Server Manager 5.1

Sterling Integrator. PGP Server Manager 5.1 Sterling Integrator 5.1 Contents Overview of...3 Create a PGP Server Profile...3 Edit a PGP Server Profile...5 Delete a PGP Server Profile...5 2 Overview of The enables you to add, edit, and delete PGP

More information

Network Security Essentials Chapter 7

Network Security Essentials Chapter 7 Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,

More information

Critical Data Guide. A guide to handling critical information at Indiana University

Critical Data Guide. A guide to handling critical information at Indiana University Critical Data Guide A guide to handling critical information at Indiana University What is critical information? IU defines critical information as sensitive data requiring the highest level of protection.

More information

The Surveillance State and what to do about it

The Surveillance State and what to do about it The Surveillance State and what to do about it Steve Revilak https://masspirates.org/ Boston Anarchist Bookfair Nov 21, 2015 1 / 29 First Principles surveillance (n) Close observation of a person or group,

More information

PGP Product Update Juha Ropponen

PGP Product Update Juha Ropponen PGP Product Update Juha Ropponen Arrow ECS Finland Oy 1 Symantec Encryption tuoteperhe uudet nimet PGP Universal Server = Encryption Management Server Whole Disk Encryption = Drive Encryption Netshare

More information

Windows Symantec Encryption Desktop (PGP) Install Guide. Symantec Encryption Desktop (PGP) Windows system requirements

Windows Symantec Encryption Desktop (PGP) Install Guide. Symantec Encryption Desktop (PGP) Windows system requirements Image not found https://it.ucsf.edu/sites/it.ucsf.edu/themes/custom/it_new/logo.png it.ucsf.edu Published on it.ucsf.edu (https://it.ucsf.edu) Home > Windows Symantec Encryption Desktop (PGP) Install Guide

More information

Encryption and Digital Signatures

Encryption and Digital Signatures GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/

More information

Honeywell Secure Email External User Guide August 2013

Honeywell Secure Email External User Guide August 2013 Honeywell Secure Email External User Guide August 2013 PAGE: 1 of 14 Chapter No Table of Content Page No 1 Introduction 3 2 Using the Honeywell Secure Email Interface 3 3 Sending an Encrypted Email to

More information

PGP Desktop for Mac OS X Quick Start Guide Version 10.0

PGP Desktop for Mac OS X Quick Start Guide Version 10.0 PGP Desktop for Mac OS X Quick Start Guide Version 10.0 What is PGP Desktop? PGP Desktop provides comprehensive security for desktops and laptops, making it possible for enterprises, workgroups, and individuals

More information

Why Endpoint Encryption Can Fail to Deliver

Why Endpoint Encryption Can Fail to Deliver Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1

More information

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes

Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Symantec Encryption Desktop Version 10.3 for Windows Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this

More information

2007-05-19. Advice, Organization, & Compilation 2000-2003 Eric L. Howes (eburger68@myrealbox.com)

2007-05-19. Advice, Organization, & Compilation 2000-2003 Eric L. Howes (eburger68@myrealbox.com) 2007-05-19 The information in this file was obtained from the internet and we attribute according to the attribution that appeared on the bottom of the page at that time. Advice, Organization, & Compilation

More information

HEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team

HEALTH INFORMATION SYSTEM (HIS) HOW TO COMMUNICATE WITH THE HIS PROJECT TEAM. How To Communicate with the HIS Project Team How To Communicate with the HIS Project Team This guide is intended to provide you with support for communicating with the HIS Project Team. There may be instances where the HIS Project Team will require

More information

Acceptable Encryption Usage for UTHSC

Acceptable Encryption Usage for UTHSC This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged

More information

1.2 Using the GPG Gen key Command

1.2 Using the GPG Gen key Command Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to

More information

E-Mail security. Mag. iur. Dr. techn. Michael Sonntag

E-Mail security. Mag. iur. Dr. techn. Michael Sonntag Mag. iur. Dr. techn. Michael Sonntag E-Mail security E-Mail: sonntag@fim.uni-linz.ac.at http://www.fim.uni-linz.ac.at/staff/sonntag.htm Institute for Information Processing and Microprocessor Technology

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

Problem. Solution. Quatrix is professional, secure and easy to use file sharing. Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities

More information

PDG Software. Keyman Encryption Guide

PDG Software. Keyman Encryption Guide Keyman Encryption Guide , Inc. 1751 Montreal Circle, Suite B Tucker, Georgia 30084-6802 Copyright 1998-2004 PDG Software, Inc.; All rights reserved. PDG Software, Inc. ("PDG Software") retains all ownership

More information

PGP Whole Disk Encryption Quick Start Guide Version 9.8

PGP Whole Disk Encryption Quick Start Guide Version 9.8 PGP Whole Disk Encryption Quick Start Guide Version 9.8 What is PGP Whole Disk Encryption? The PGP Whole Disk Encryption (WDE) product is a software tool that provides multiple ways to protect your data

More information

Acer edatasecurity Management

Acer edatasecurity Management 1 Acer edatasecurity Management Acer edatasecurity Management offers you greater personal data security and encryption for files and data transmitted via instant messaging or email. It supports the Personal

More information

Internet Programming. Security

Internet Programming. Security Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures

More information

Learning how OpenPGP works and how to use it to manage your keyring has just been a warm-up to the real meat of this book: using OpenPGP with email.

Learning how OpenPGP works and how to use it to manage your keyring has just been a warm-up to the real meat of this book: using OpenPGP with email. 8 O P E N P G P A N D E M A I L Learning how OpenPGP works and how to use it to manage your keyring has just been a warm-up to the real meat of this book: using OpenPGP with email. Both PGP and GnuPG extend

More information

Cryptography and Network Security Chapter 15

Cryptography and Network Security Chapter 15 Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North

More information

GPG installation and configuration

GPG installation and configuration Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing

More information

How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application

How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application In order to ensure Personal Health Information (PHI) and Personally Identifiable Information (PII) is protected, KDADS

More information

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1 Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can

More information

INTRODUCTION TO CRYPTOGRAPHY

INTRODUCTION TO CRYPTOGRAPHY INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH anas@tawileh.net Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License

More information

Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014) Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.

More information

Departmental (Service) Account Set Up

Departmental (Service) Account Set Up Departmental (Service) Account Set Up Exchange does not offer an exact equivalent to GroupWise proxy. Listed below are different methods of accessing your departmental or service account. All require that

More information

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo)

How To Encrypt A Traveltrax Report On Gpg On A Pc Or Mac Or Mac (For A Free Download) On A Thumbdrive Or Ipad Or Ipa (For Free) On Pc Or Ipo (For An Ipo) EMAIL ENCRYPTION Guide June 3, 2013 TABLE OF CONTENTS Steps to Create Encryption Public Key... 3 Installing GPG... 3 Key Generation Process... 4 Update User Settings... 6 Decrypting an encrypted file...

More information

Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011

Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form

More information

Keep Hackers Guessing: Protecting Corporate Information While On The Go

Keep Hackers Guessing: Protecting Corporate Information While On The Go Keep Hackers Guessing: Protecting Corporate Information While On The Go Proactive tips for wireless information security for traveling professionals. In today s world where WiFi hotspots are available

More information

31 Ways To Make Your Computer System More Secure

31 Ways To Make Your Computer System More Secure 31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows

More information

1. Our staff would like to exchange files with outside parties (clients, attorneys) using a web service (such as Dropbox ). Is this safe?

1. Our staff would like to exchange files with outside parties (clients, attorneys) using a web service (such as Dropbox ). Is this safe? 1. Our staff would like to exchange files with outside parties (clients, attorneys) using a web service (such as Dropbox ). Is this safe? The key is to do your "due diligence. Make sure that you fully

More information

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data

More information

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015 Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is

More information