PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.



Similar documents
DRAFT Standard Statement Encryption

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Guidelines on use of encryption to protect person identifiable and sensitive information

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

Release: 1. ICANWK502A Implement secure encryption technologies

Securing Data at Rest ViSolve IT Security Team

File System Encryption in C#

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Using End User Device Encryption to Protect Sensitive Information

How To Encrypt Data With Encryption

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Security Policy Revision Date: 23 April 2009

BCTextEncoder Help File

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Online Backup by Mozy. Common Questions

Internet Programming. Security

Blaze Vault Online Backup. Whitepaper Data Security

Clearswift Information Governance

[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX ] 1

Cyber Self Assessment

Security. TestOut Modules

Secure Shell. The Protocol

Encryption Policy Version 3.0

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Stealth OpenVPN and SSH Tunneling Over HTTPS

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Xerox DocuShare Security Features. Security White Paper

An Overview of the Secure Shell (SSH)

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

INTRODUCTION TO CRYPTOGRAPHY

Apptix Online Backup by Mozy

Please note that a username and password will be made available upon request. These are necessary to transfer files.

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Question How do I access the router s web-based setup page? Answer

Connecting to the School of Computing Servers and Transferring Files

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

How to Create and Maintain an Anonymous Identity Online

The next generation of knowledge and expertise Wireless Security Basics

ipad in Business Security

Obtaining a user account and password: To obtain a user account, please submit the following information to AJRR staff:

Aegis Padlock for business

Technical White Paper BlackBerry Security

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue:

Research Information Security Guideline

Introduction. Keeping Data Safe and Secure. Topics of Interest. Disclaimer. How Is Data Lost In General? Reasons for Data Loss by 3 rd Parties

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

NWIMS. Online Backup Security Documentation

Overview. Remote access and file transfer. SSH clients by platform. Logging in remotely

CONNECTING THE RASPBERRY PI TO A NETWORK

Lab Configure Basic AP Security through IOS CLI

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Cisco Virtual Office Express

Introduction to Cryptography

Network Management Card Security Implementation

Methods available to GHP for out of band PUBLIC key distribution and verification.

Computer Networks. Secure Systems

Encryption and Digital Signatures

The last page of these notes has the commands for invoking Stata on Linux.

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

DiamondStream Data Security Policy Summary

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

Security Goals Services

How to Backup XenServer VM with VirtualIQ

Ahsay Online Backup. Whitepaper Data Security

Guide how to protect your private data with Rohos Disk Encryption

1 Using DATABOKS Online Backup Manager

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Data Superhero Online Backup Whitepaper Data Security

Deploying iphone and ipad Security Overview

BANKING SECURITY and COMPLIANCE

How To Use Quantum Rbs Inc. Small Business Backup

Web-Based Data Backup Solutions

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Signing and Encryption with GnuPG

Quick Start Guide NVR DS-7104NI-SL/W NVR. First Choice For Security Professionals

Computer System Management: Hosting Servers, Miscellaneous

WS_FTP Professional 12. Security Guide

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Access to HZB internal computers via SSH tunnel with PuTTY (Screenshots Windows 7)

Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your communication. Topic

802.1x Networking. tommee pickles Moloch Industries. Moloch.org tommee.net

Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction

USFSP Network Security Guidelines

Movie Cube. User s Guide to Wireless Function

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version

Transcription:

Social Sciences Computing a division of File Security John Marcotte Director of February 2008

File Security Review security issues Overview of encryption Software Data Security Plan Questions

Reasons for Security Sensitive information SSN Date of birth Health information Privacy NIH mandate Computer theft

Purpose of Security Protect files on disk Single file Multiple files Add and remove files routinely Flash drives, CDs and DVDs Send and receive files securely Ad-hoc basis On-going correspondence

File Security Physical Security Doors and locks Safes and cabinets

File Security Logical Security Strong Passwords Network restrictions Encryption

Strong Passwords At least 8 characters, 14 characters or longer is better Not in the dictionary Mix of letters, numbers, special characters (e.g. #,*,&,$)

Permissions Non-sensitive information Keep out intruders without physical access Default permissions are usually not restrictive

File Security Permissions File system rights Administrator failsafe Physical security important Encryption Encryption key required even with physical access Lost key could make file contents inaccessible

Encryption Protect information even if physical access Risk of information loss if encryption keys lost or corrupted Special recovery plan needed Hard to share files on network

Encryption Methods Advanced Encryption System (AES) (128, 192, 256 bit) Data Encryption System (DES) (64 bit)* Triple-DES (3DES) (128 bit)* Other methods: Archfour (128 bit), BlowFish (128 bit), TwoFish (256 bit), IDEA (128 bit), Cast-128 (128 bit) A key should be a minimum of 64 bits. With sufficient resources (14,000 computers in 1997!), a 64 bit key can be cracked.

Encryption Methods Symmetric Shared secret Encrypt and decrypt with same key Never send key via e-mail Asymmetric Public key-private key pair Encrypt with shared public key Decrypt with private key

Encryption Methods Password-protected key Change password without changing encryption key; best for file system Password as key Decrypt and re-encrypt to change password; good for single file

Encryption Issues Recovery Network traffic Export and Import restrictions Secure deletion of files Temp files Clipboard

Encryption Recovery Copy of non-encrypted version of file in safe Copy of encryption key in safe Key escrow system Recovery software in safe

Network Traffic Network traffic is not usually encrypted Use SSH (Secure Shell) to create encrypted tunnel Software: PuTTY, SecureCRT, WinSCP, FileZilla On the web, use https:// that uses SSL (Secure Sockets Layer) if sending and receiving private information Are all network paths encrypted?

International Issues Export and Import Restrictions The United States has restrictions on exporting encryption software; AES and 3DES are restricted. Some countries have import restrictions 64-bit encryption is allowed Blowfish is also allowed

Secure Deletion Deleted files can be undeleted if not overwritten Special software is required

Software TrueCrypt AxCrypt GNU Privacy Guard (GPG) & Pretty Good Privacy (PGP) Eraser SFTPdrive

TrueCrypt Open Source and Freeware Cross-platform: Windows, Linux, Mac Mounts virtual encrypted disk Password protected key Ability to backup encryption key

TrueCrypt Can work with encrypted files without having to decrypt them Files saved on the encrypted disk are automatically encrypted Erased files on encrypted disk are still protected Copying files off the encrypted disk decrypts them

TrueCrypt Works on USB flash drive Must be installed o Symmetric: shared secret or key file o Limited simultaneous user capability o No automatic key escrow

TrueCrypt Web-site: http://www.truecrypt.org/ Beginner s Tutorial: http://www.truecrypt.org/docs/?s=tutorial

TrueCrypt and SAS SAS creates temporary files in the work directory. By default the work directory is not on the encrypted drive. To run SAS on the encrypted drive, modify the Windows shortcut for SAS to put work files on the encrypted drive. Add work X:\SAS-work at the end of the command to invoke the SAS program. X: is the letter for the encrypted drive SAS-work is a directory that you created on the encrypted drive for your SAS work files Full shortcut: SAS 9.1 (English).lnk "C:\Program Files\SAS\SAS 9.1\sas.exe" -CONFIG "C:\Program Files\SAS\SAS 9.1\nls\en\SASV9.CFG" -work x:\sas-work

AxCrypt Open Source and Freeware Encrypt single file Decrypt file to use it Password as key Small (< 75K) decryption program that can be included with file Web-site: http://axcrypt.sourceforge.net/

GPG and PGP GPG : Gnu Privacy Guard PGP : Pretty Good Privacy GPG is an open source, freeware version of PGP. Asymmetric encryption: Public Key-Private Key (no shared secret) Cross-platform: Windows, Linux Decrypt file to use it Ideal for sending information securely on an ongoing basis. Can be integrated into many e-mail clients o Everyone must have set up GPG keys in advance Web-site: http://www.gnupg.org/

Eraser Open Source and Freeware Overwrites deleted file so it cannot be recovered Overwrite all deleted files on a disk so that they cannot be recovered. Web-site: http://www.heidi.ie/eraser/

SFTPdrive Commercial software Map drive through SSH encrypted tunnel Works through gateway or proxy server o No good freeware alternative Web-site: http://www.sftpdrive.com/

Encrypted Tunnels Port forwarding using SSH client: PuTTY or SecureCRT Open file share through tunnel o Can make a secure connection to only one server at a time Alternative: use SFTPdrive Copy files via SSH with WinSCP or FileZilla

Wireless Wireless may not be encrypted AirSAS uses the SecureW2 client which does encrypt Home wireless is not usually encrypted; Use WPA (Wi-Fi Protected Access) WEP (Wireless Encryption Protocol) can be hacked

Laptops Laptops are often stolen or lost Encrypt entire disk; system will not start without password Software to track location Software to erase disk remotely Penn is considering what to recommend

Flash Drives TrueCrypt can create an encrypted section of a flash drive TrueCrypt must be pre-installed, or you must be the administrator on any computers where you want to use the flash drive TrueCrypt is installed in labs

Sensitive Data Plan Data provider must approve plan to protect data. One possibility is a stand alone nonnetworked PC in a locked office Original data media locked in safe or cabinet

Stand Alone PC Stand alone, non-networked PC in locked office Use encryption to protect data even if physical access is compromised Second computer for e-mail and network access. KVM (Keyboard-Video-Mouse) switch to share keyboard, video and mouse between networked and non-networked PCs

More Information A (Very) Brief Introduction to Cryptography http://www.int.gu.edu.au/courses/2010int/crypto.html Encryption Algorithms http://www.cescomm.co.nz/about/algorithms.html Security Dictionary http://www.cryptomathic.com/labs/techdict.html

File Security and Encryption Questions