Cyber Security Awareness Month
description
Transcript of Cyber Security Awareness Month
![Page 1: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/1.jpg)
Cyber Security Awareness Month
Protecting Your Laptop’s Data
Off-Campus Safe Computing Part 1
![Page 2: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/2.jpg)
IntroductionsAllen Monette
Security Coordinator
Office of Campus Information Security
![Page 3: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/3.jpg)
Why are we here?
![Page 4: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/4.jpg)
![Page 5: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/5.jpg)
OCIS Brown Bag Series
Worst Practices, or 10 Easy Steps to Loosing Your DataProtecting Your Laptop’s DataUsing Your Laptop Safely on the RoadFinding and Protecting Sensitive Data on Your ComputerProtecting Data by Using Network and Server Scanning Tools
![Page 6: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/6.jpg)
Effective Practices for Restricted Data HandlingRisk Reduction Strategy
OR
ORTHEN
Risk Reduction Strategies Risk Assessment
![Page 7: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/7.jpg)
Why Encryption?
![Page 8: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/8.jpg)
It’s 3am…
Do you know where your laptops are?
Full Disk Encryption protects against lost devices
![Page 9: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/9.jpg)
Would you trust…
this guy with your files?
File and Folder Encryption protects specific data
![Page 10: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/10.jpg)
How does it work?
![Page 11: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/11.jpg)
File encryption
Think of file encryption as a secret code
A simple code:A=0B=1C=2D=3Etc
A message:7 4 11 11 1422 14 17 11 3
![Page 12: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/12.jpg)
Folder encryption
Think of folder encryption as a safe deposit box
![Page 13: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/13.jpg)
Full Disk Encryption
Think of Full Disk Encryption like a bank vault
![Page 14: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/14.jpg)
How does it really work?
![Page 15: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/15.jpg)
File and folder Encryption• Encrypts individual files or entire folders• Requires authentication to decrypt and access the
files
![Page 16: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/16.jpg)
Full Disk Encryption• Replaces the master boot record with a special pre-
boot environment• Encrypts the entire hard drive• Preboot Authentication plus OS authentication• Decrypts as files are used
![Page 17: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/17.jpg)
How to choose between Full Disk and File/Folder?
![Page 18: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/18.jpg)
When to use Full Disk Encryption
Full Disk Encryption protects against lost devices
![Page 19: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/19.jpg)
When to use file/folder• Need an additional layer of security• Need portability• Need to support removable media
![Page 20: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/20.jpg)
What is UW Madison doing?
![Page 21: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/21.jpg)
Laptop/Desktop Encryption Project
Full disk and file/folder encryption for
PC
Mac
![Page 22: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/22.jpg)
Nice if you can get it
![Page 23: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/23.jpg)
Product Selected
![Page 24: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/24.jpg)
Product Selected
![Page 25: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/25.jpg)
Where are we now?
• Installed on about 250 computers• Registrar’s office, Financial Aid, Admissions,
and UW Survey Center are leading the pack on installs
• UW Milwaukee purchasing their own licenses and running their own server
• Ready for more participants
![Page 27: Cyber Security Awareness Month](https://reader030.fdocuments.net/reader030/viewer/2022033018/56815f50550346895dce2f56/html5/thumbnails/27.jpg)
Questions?