Encryption: Ensuring Information Security



Similar documents
Guidelines on use of encryption to protect person identifiable and sensitive information

PGP Whole Disk Encryption Training

Disk Encryption. Aaron Howard IT Security Office

Data Storage for Research. Michael Pinch

Mobile Device Security and Encryption Standard and Guidelines

Vs Encryption Suites

Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story

Protect Sensitive Data Using Encryption Technologies. Ravi Sankar Technology Evangelist Microsoft Corporation

Excerpt of Cyber Security Policy/Standard S Information Security Standards

The virtual safe: A user-focused approach to data encryption

Data storage, collaboration, backup, transfer and encryption

Using End User Device Encryption to Protect Sensitive Information

2007 Microsoft Office System Document Encryption

Encryption Made Simple for Lawyers

Deployment Strategies for Effective Encryption

MS 50292: Administering and Maintaining Windows 7

Encryption Buyers Guide

DriveLock and Windows 7

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.

Information Security Awareness Training

COVER SHEET OF POLICY DOCUMENT Code Number Policy Document Name

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Encrypting Personal Health Information on Mobile Devices

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

Storing and securing your data

Laptop Encryption. Tom Throwe. 1 August RHIC and ATLAS Computing Facility. (Brookhaven National Laboratory) Laptop Encryption 8/1/07 1 / 17

More Expenses. Only this time the Telegraph will have to pay them after their recent data breech

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

Information Security It s Everyone s Responsibility

The Contractor's Responsibility - Preventing Improper Information Process

Acceptable Encryption Usage for UTHSC

Why Endpoint Encryption Can Fail to Deliver

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

Backups. Backup Plan. How to use the Backup utility to back up files and folders in Windows XP Home Edition

Information Technology Services Guidelines

Virginia Commonwealth University School of Medicine Information Security Standard

'Namgis Information Technology Policies

Mobile Device Security

For your eyes only - Encryption and DLP Erkko Skantz

Managing Applications, Services, Folders, and Libraries

Course Outline. ttttttt

Page 1. Copyright MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved.

For Managing Central Deployment, Policy Management, Hot Revocation, Audit Facilities, and Safe Central Recovery.

Protection of Computer Data and Software

Storing and securing your data

Storage, backup, transfer, encryption of data

Course: Information Security Management in e-governance

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

Network Security for End Users in Health Care

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Harbinger Escrow Services Backup and Archiving Policy. Document version: 2.8. Harbinger Group Pty Limited Delivered on: 18 March 2008

Other terms are defined in the Providence Privacy and Security Glossary

Endpoint & Media Encryption

A Websense White Paper Websense CloudMerge Ingestion Service

Information Security Policy

INFORMATION UPDATE: Removable media - Storage and Retention of Data - Research Studies

Secure Storage. Lost Laptops

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

Hands-On How-To Computer Forensics Training

USB Portable Storage Device: Security Problem Definition Summary

Congregation Data Security Education

Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com)

Introduction to BitLocker FVE

How To Use Truecrypt For Free On A Pc Or Mac Or Mac (For A Laptop) For A Long Time (For Free) For Your Computer Or Ipad Or Ipa (For Mac) For Free (For Your Computer) For Long

DRAFT Standard Statement Encryption

HIPAA Training for Hospice Staff and Volunteers

University of Liverpool

Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1

PGP Proof of Concept Completion Checklist

CITY UNIVERSITY OF HONG KONG. Inventory and Ownership Standard

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

FAQ. F-Secure Online Backup

ABERDARE COMMUNITY SCHOOL

PGP Whole Disk Encryption Implementation

COMPUTER SECURITY PRINCIPLES AND PRACTICES BY

Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Implementing and Supporting Microsoft Windows XP Professional

Total Backup Recovery 7

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

BACKUP SECURITY GUIDELINE

Lecture 6: Operating Systems and Utility Programs

Managing BitLocker With SafeGuard Enterprise

Total Backup Recovery 7

Electronic Data Retention and Preservation Policy 1

Secure data storage. André Zúquete Security 1

Disaster Recovery Checklist Disaster Recovery Plan for <System One>

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

End User Encryption Key Protection Policy

Enterprise Data Protection

September Tsawwassen First Nation Policy for Records and Information Management

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

INITIAL APPROVAL DATE INITIAL EFFECTIVE DATE

SecureAge SecureDs Data Breach Prevention Solution

LSE PCI-DSS Cardholder Data Environments Information Security Policy

Introduction to Cloud Services

Transcription:

Encryption: Ensuring Information Security Colin Chisholm CISSP, GCIH Information Security Analyst Associate Information Security & Systems / Compliance cchisholm@northwestern.edu

Agenda Encryption - Explanation & History Goals Data Encryption Policy Encryption Scenarios Steps Toward Compliance Takeaways Q & A

What is Cryptography? Cryptography is the practice of protecting written secrets Encryption is the process of transforming information into an unreadable form

Looking Back Historically, cryptography has been the domain of entities such as governments, corporations and banks Data + Resources + Motivation = Encryption Exponential increases in computing power and the development of the personal computer industry has leveled the playing field Strong crypto is now available to all

Today The information age has introduced a vast increase in the amount of data generated daily. More data in more places Common data types include email, documents, spreadsheets, address books, calendars, photos, music, videos Common data locations include desktops, laptops, cell phones, smart phones, PDAs, USB sticks, external hard drives, gaming consoles, digital video recorders Data has become ubiquitous and commonplace.

Encryption Goals Confidentiality Keeping information secret from those who are not authorized to have it Integrity Preventing data from being altered in unexpected ways

Loss prevention Encryption Goals Intellectual property, research, personally identifiable information, HR records, financial information Regulations and compliance requirements to report loss Intangible losses can result from media exposure of data including loss of prestige and reputation

Policy Statement "Schools, departments and business functions are required to employ University-approved encryption solutions to preserve the confidentiality and integrity of, and control accessibility to, University data classified as Legally/Contractually Restricted where this data is processed, stored or transmitted using University-approved systems"

Policy Implementation Data Encryption Policy is available at: www.it.northwestern.edu/policies/dataencryption.html Policy was published October, 2008 Compliance is required by April, 2009 ISS/C is available as a resource for consultation at any stage of the deployment of an encryption solution

Considerations University departments have differing resources (technical staff, budget, etc) Encryption solutions have been selected ranging from commercial to freeware solutions The cost of the encryption technologies and associated controls should be commensurate with the sensitivity and value of the data to be protected

Out of Scope Servers, databases, network infrastructure systems Unix/Linux operating systems (OS X excepted) Student population Student systems are not University property. Students with access to sensitive data should be using University resources which fall under this policy

In Scope Applies to commonly used user-level systems Hardware focus on laptops, desktops, PDAs Operating System focus on Windows, Macintosh and select PDA systems Faculty, Staff, contractors, vendors and others (including 3rd parties) entrusted with University sensitive data

Preferred Solutions OS-Native Solutions BitLocker (Windows Vista) EFS (Windows 2000 & XP) FileVault & Disk Images (OS X) Mobile Device Encryption PointSec Mobile (Palm, Windows Mobile, Symbian) Full Disk Encryption CheckPoint Full Disk Encryption, TrueCrypt (Windows) PGP Desktop (Windows and OS X)

Key Strength The complexity and strength of the key is essential to assuring the protection of data The strongest encryption algorithm can be easily defeated by the use of a weak key NUIT Passphrase / Password Guide www.it.northwestern.edu/netid/password.html 14 11

Physical Security Physical security is vital to information security Controls implemented to protect data are weakened or eliminated with the loss of physical security Physical components to information security include hard drives, memory, backup tapes, CDs, DVDs, networking cable, servers, infrastructure equipment, paperwork, filing cabinets, and offices

Encryption Scenarios Boot Disk / Full Disk Encryption File / Folder / External Device Encryption Mobile Device Encryption Transport Level Encryption

Security as a Process Security is a process, not a product Information systems and the environments they operate in are dynamic Changes in technology, data, users and goals over time affect system security Systems, data, users and policies should be periodically reviewed with regard to information security

Home vs Office University-approved systems may include home machines used to access the NU network Don t store sensitive information on your home machine (e-mails, spreadsheets, documents, etc) VPN (Virtual Private Network) should always be used when connecting to NU from off-site Use encryption products where appropriate

Steps Toward Compliance 1. Data Classification 2. Solution Selection & Implementation 3. Encryption Keys 3.1.Key Creation 3.2.Key Management 3.3.Key Recovery Planning

Takeaways Security is a process, not a product Eliminate sensitive data from portable systems Physical security is king Encryption is a limited solution, not a silver bullet Combine encryption types to provide defense in depth Strong keys (passwords / passphrases)

Q & A