encryption

14
ENCRYPTION Coffee Hour for August 2014

Upload: selia

Post on 05-Jan-2016

35 views

Category:

Documents


4 download

DESCRIPTION

Encryption. Coffee Hour for August 2014. History of encryption. Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message Caesar cipher – encrypted communications by substituting one letter for another, usually a shift of 3 letters in the alphabet - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Encryption

ENCRYPTIONCoffee Hour for August 2014

Page 2: Encryption

HISTORY OF ENCRYPTION

• Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message

• Caesar cipher – encrypted communications by substituting one letter for another, usually a shift of 3 letters in the alphabet

• Enigma Machine – Sophisticated for its time, allowed Germans to encypt communications during World War II, used rotors to substitute characters

Page 3: Encryption

WHAT IS ENCRYPTION?

• Encryption uses complex mathematical formulas to take plain text and turn it in to cipher text• Example:

• Plain Text: Coffee Hours are great!• Encryption happens…• Cipher Text: jusklad nasdl ksd hd;klq

• Cipher text can’t be read unless you have the “key” that will turn it back into plain text

• Keys can be passwords, PINs, even smart cards

Page 4: Encryption

WHY SHOULD I ENCRYPT?

• Encryption ensures confidentiality

• Its all about keeping your private files, private

• Its simple to do, in fact you use it without even realizing it when you shop online or use your bank’s customer portal

Page 5: Encryption

TYPES OF ENCRYPTION

• Data at rest• Full Disk Encryption (FDE)

• This has to be turned on, it is not on by default in most operating systems• Protects the contents of your entire drive

• Data in motion• Secure Sockets Layer (SSL)

• This happens behind the scenes. When you are on a banking or retail site and you see https:// or the padlock icon, it means that SSL is being used to encrypt your data. You don’t have to do anything to get this to work. Your computer and the organization’s server work out the details on their own

Page 6: Encryption

BITLOCKER

• Bitlocker provides full disk encryption for Microsoft Windows systems

• It relies on a chip (TPM) on the motherboard, which stores the encryption key.

• Save your recovery key in a safe place like an external hard drive, flash drive or CD. If Bitlocker detects any errors (disk errors, change to BIOS, changes to startup files) you will need to enter the recovery key to regain access to your files

• It is available in these versions of Windows:• Windows Vista• Windows 7 Ultimate • Windows 7 Enterprise• Windows 8.1 Pro• Windows 8.1 Enterprise

Page 7: Encryption

HOW TO TURN ON BITLOCKER

• Be sure that you are connected to a reliable power source

• Go to Start Control Panel System and Security

• Click on Bitlocker Drive Protection

• Click Turn On Bitlocker – This opens the Bitlocker Setup wizard. Follow the instructions in the wizard

• Your computer will be restarted, then Bitlocker will begin encrypting the drive

Page 8: Encryption

FILEVAULT

• FileVault provides full disk encryption for Mac OSX operating systems

• It is available on Mac OSX Lion (10.7) or later and you must have a recovery drive on your system (You can get to this by holding command + r while your Mac boots)

• All user accounts must have a password set

• When enabling FileVault, you are given a recovery key. Save this in a safe place. If you forget your password, this is the only way for you to get in to your system

• Apple provides storage of your recovery key in iCloud. You will have to set up 3 security questions. You must be able to give the exact answer, they are case sensitive. This is a great backup in case you lose the key and you forget your password. Note: You do need to have an iCloud account for this to work.

Page 9: Encryption

HOW TO TURN ON FILEVAULT

• Be sure that you are connected to a reliable power source

• Go to System Preferences Security and Privacy

• Click on the FileVault tab

• Choose “Enable FileVault” (If this option is grayed out you may need to click on the padlock to make the change)

• If there are more than one user accounts, you will be asked which accounts may be used to access the encrypted drive. You will need to enter the password for each of the accounts

• You will be shown your recovery key next. Make a copy of this key. You can store it with Apple as well

• You will now be prompted to restart your Mac. When it comes back up it will begin encrypting the drive

Page 10: Encryption

IPHONES/IPADS (IOS)

• Encryption available for:• iPhone 3GS and later• All iPad models• iPod Touch (3rd generation or later)

• Apple refers to this as data protection

• Data protection is enabled when you set a passcode on your Apple iOS device

Page 11: Encryption

HOW TO TURN ON DATA PROTECTION

• Tap Settings General Passcode

• Follow the prompts to create a passcode

• After the passcode is set, scroll down to the bottom of the screen and verify that “Data protection is enabled” is visible

• Passcode Tips• Set require passcode immediately• Disable simple passcode to use longer,

alphanumeric passcodes• Enable erase data to automatically erase the device

after ten failed passcode attempts

Page 12: Encryption

ANDROID

• Encryption can cause some slowness because of the overhead on the system• The initial encryption time varies but is usually about an

hour. Don’t interrupt this process.• Encryption is irreversible on Androids. The only way to

remove it is to perform a factory reset, which also wipes your device’s data.• To access your Android once you have encrypted it,

simply type in your password

Page 13: Encryption

HOW TO ENCRYPT YOUR ANDROID

• Note: Menus may vary by manufacturer

• Ensure that you are connected to a reliable power source

• Set a PIN or password for the lock screen

• Go to Settings Security and select Encrypt Phone or Encrypt Tablet (The encryption menu may move around, for instance it is under the Storage menu on some HTC devices)

• Press the Encrypt button at the bottom

Page 14: Encryption

HOW TO ENCRYPT YOUR ANDROID

• You may also use 3rd party apps to encrypt your phone rather than the native feature in the Android operating system

• Some favorites include:• SSE – Universal Encryption App (free)• Encryption Manager (around $4)

• NOTE: Some Sony phones do not have the native encryption feature so you would need to use a 3rd party app like those above