Encryption Applications George Bailey Information Security Ivy Tech Community College Tech Day –...
-
Upload
sebastian-maynard -
Category
Documents
-
view
227 -
download
3
Transcript of Encryption Applications George Bailey Information Security Ivy Tech Community College Tech Day –...
Encryption Applications
George Bailey
Information Security
Ivy Tech Community College
Tech Day – Columbus, Indiana
Topics
• Password Vaults
• Data Encryption
• E-Mail Encryption
• Transport Encryption
• Hashing
Tech Day – Columbus, Indiana
Password Vaults
• Too many passwords to remember
• Bad practice to write them down unprotected…Avoid sticky Note Syndrome!
• Vaulting allows for encrypted storage of password databases
Tech Day – Columbus, Indiana
Password Vault Demo
Tech Day – Columbus, Indiana
http://keepass.sourceforge.net/
Data Encryption
• Data Confidentiality– No unauthorized disclosure of data– Protect data on network shares– Protect data on removable media & mobile
devices
• Data Integrity– No unauthorized modification of data
Tech Day – Columbus, Indiana
Data Encryption Demo
• File Encryption– GnuPG – http://www.gnupg.org/
• Virtual Disks– TrueCrypt – http://www.truecrypt.org/– Private Disk – http://www.dekart.com/
• Whole Disk– Pretty Good Privacy – http://www.pgp.com/
Tech Day – Columbus, Indiana
E-Mail Encryption
• Secure communication– Contents of E-mail encrypted
• Source authentication– Digital signature confirms sender authenticity
• Message integrity– Digital signature used to verify genuineness of
message content
Tech Day – Columbus, Indiana
E-Mail Encryption Demo
Tech Day – Columbus, Indiana
Transport Encryption
• Secure Authentication– Login credentials are encrypted
• Secure Terminal Emulation– Screen data viewed is encrypted (e.g. system
configs)
• Secure Data Transfer– Unlike FTP, data transfers are encrypted
Tech Day – Columbus, Indiana
Transport Encryption Demo
• Putty - http://www.chiark.greenend.org.uk/~sgtatham/putty/
Tech Day – Columbus, Indiana
Hashing
• Confirm the integrity of data– Confirm MD5 and SHA-1 hashes of software
• Fast one-way encryption for password storage
• Used to detect errors in transmission– Redundancy check
Tech Day – Columbus, Indiana
Hashing Demo
• Confirming MD5 and SHA-1 hashes DigestIT - http://digestit.kennethballard.com/download.html
Tech Day – Columbus, Indiana
Questions