encryption initiative – uw madison
DESCRIPTION
Encryption Initiative – UW Madison. CTIG – March 20, 2009. McAfee Endpoint Encryption (formerly SafeBoot). Introductions. Phil Saunders, LAN Manager Office of the Registrar Division of Enrollment Services 333 East Campus Mall – open house soon!. Why are we here?. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/1.jpg)
Encryption Initiative – UW Madison
McAfee Endpoint Encryption (formerly SafeBoot)
CTIG – March 20, 2009
![Page 2: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/2.jpg)
Introductions
Phil Saunders, LAN ManagerOffice of the Registrar
Division of Enrollment Services
333 East Campus Mall– open house soon!
![Page 3: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/3.jpg)
Why are we here?
![Page 4: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/4.jpg)
![Page 5: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/5.jpg)
Effective Practices for Restricted Data HandlingRisk Reduction Strategy
• Find It: Determine if you store or process restricted data.
Are you at Risk?
OR
ORTHEN
Risk Reduction Strategies Risk Assessment
![Page 6: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/6.jpg)
Why Encryption?
![Page 7: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/7.jpg)
It’s 3 a.m. . . .
Do you know where your notebooks are?
Full Disk Encryption protects lost devices- and you - from data loss and litigation!
![Page 8: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/8.jpg)
Would you trust . . .
this guywithyour files?
File and Folder Encryption protects specific data
![Page 9: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/9.jpg)
How doesit work?
![Page 10: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/10.jpg)
File encryption
Think of file encryption as a secret codeA simple
synchronouscode:A=1B=2C=3D=4Etc
A message:20 – 7 – 9 - 6
![Page 11: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/11.jpg)
Folder encryption
Think of folder encryptionas a safe deposit box
![Page 12: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/12.jpg)
Full Disk Encryption
Think of Full Disk Encryptionas a bank vault
![Page 13: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/13.jpg)
How does itreallywork?
![Page 14: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/14.jpg)
File and folder Encryption• Encrypts individual files
or entire folders• Requires authentication
to decrypt and access the files
![Page 15: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/15.jpg)
Full Disk Encryption
• Replaces the master boot recordwith a special pre-boot environment
• Encrypts the entire hard drive• Preboot Authentication plus OS
authentication• Decrypts as files are used
![Page 16: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/16.jpg)
How to choose between Full Disk and File/Folder?
![Page 17: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/17.jpg)
When to use Full Disk EncryptionFull Disk Encryption protects against
lost devices
![Page 18: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/18.jpg)
When to use file/folder
• Need an additional layer of security
• Need portability• Need to support removable media
![Page 19: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/19.jpg)
What isUW Madison
doing?
![Page 20: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/20.jpg)
Laptop/Desktop Encryption Project
Full disk and file/folder encryption for
PC
Mac
![Page 21: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/21.jpg)
Nice if you can get it
AIG BONU
S
![Page 22: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/22.jpg)
Product Selected
![Page 23: Encryption Initiative – UW Madison](https://reader035.vdocument.in/reader035/viewer/2022062803/56814660550346895db382a9/html5/thumbnails/23.jpg)
Where are we now?
• Installed on about 400-ish computersAdmissions, Financial Aid, ISIS Central, Registrar’s office, (DEM) & UW Survey
• UW Milwaukee purchasing their own licenses and running their own server
• Ready for more participants!